So, You’ve got Cyber Insurance and You’re all Set, Right?  

Cyber Insurance

How about we play a little cyber insurance trivia to find out?  Trust me; it’s more interesting than you might think. In an interview between Carole Theriault and Martin Overton, Theriault plays, “Covered by cyber Insurance, True or False” with Overton, who once worked for a large cyber insurance company. Overton describes himself as a

“Next Gen” Devices Aren’t Going to Solve Your Current Security Problems

next gen security, cybersecurity

Are you sick of the marketing hype suggesting some “Next Gen” security device can solve all your security problems? Yes? Good. If not, maybe you should be. Let’s pick on the Redmond giant for a moment to illustrate an example. Microsoft announced last month that after a legal victory, it had taken down 99 websites

Enhanced Ransomware Protection

Although the industry acknowledges a decline in the number of ransomware attacks in 2018, this news isn’t anything to get excited about. The trend has moved from targeting individuals via mass email campaigns to companies by way of manual attacks. Perhaps the reason for this is security awareness programs have been effective, and end users

The Case for a Managed Security Service Provider

  Watch this short presentation of Ben Thurston, Director of Cybersecurity at CTI explaining why vigilance and threat detection are critical in the foundation of cybersecurity, and why organizations should consider working with a Managed Security Service Provider (MSSP) is one of the best options for protecting your business and your customers. Request a complimentary

Crime Does Pay

Well, at least cybercrime does. In fact, it turns out that it pays well. Bromium published a report in 2018 in which it asserted: “High-earning cyber criminals can make $166,000+ per month; Middle-earners can make $75,000+ per month; Low-earners can make $3,500+ per month.” That is serious money for the high and middle earners. For

Data Privacy is not an Illusion, but the Solution might be

We have all been exposed, if not inundated, with the fact that so much of our personal information has been systematically harvested for years. Both with and without our knowledge or consent. Combine this with a never-ending stream of data breaches that have left vast amounts of our personal lives scattered about the dark web

Navigating an Unchartered Territory of Cybersecurity.

It was by pure chance that I attended a security symposium at Harvard’s School of Engineering and Applied Sciences (SEAS) several years ago. I don’t know exactly what attracted me to this particular meeting of crypto minds, but it was a very fateful day in my knowledge and understanding of Cybersecurity. Among many of the

Dark Web? We don’t need no stinking Dark Web…

Wait what? Need the Dark Web? What are you talking about? The truth is so much information about you is already available in all the places where it’s supposed to be secure. Imagine for a second that your personal information only existed in the Dark Web.  Ironically, it might really be less accessible – well

Apathy: CyberSecurity’s biggest HURDLE

WE ARE COMFORTABLY NUMB, AND THE DATA AGGREGATORS KNOW IT…. Who knew Pink Floyd’s classic rock hit could be the theme song to the current state of data breaches.  Given the lack of any lasting public outrage for data breaches and leaks of personal data, I find myself wondering if the masses really care?  Meaning,

Along the Fault Line: CA takes on Data Privacy Rights & Silicon Valley Freaks

What’s to worry about California taking on Data Privacy Rights legislation that aims to protect the individual’s data and punish businesses that make their cash by peddling it? Well, it seems that if you Google “California GDPR”, ironically you might find results indicating that Google is none-too-happy, for one. Yes, that’s right, California has passed,


© Corporate Technologies, Inc.   |  Privacy & Legal