Swivel Chair Syndrome: The Impacts of Repetition

This is the header image for the blog Swivel Chair Symdrome

In this 2-part series we will break down the physical damage that multiple redundant data entries can have on your workforce, and ways to mitigate these risks for a more accurate and resilient data foundation and human workforce. Repetition often manifests through ‘band-aid’ style fixes, leaving the data owners to sacrifice any combination of the

So, You’ve got Cyber Insurance and You’re all Set, Right?  

Cyber Insurance

How about we play a little cyber insurance trivia to find out?  Trust me; it’s more interesting than you might think. In an interview between Carole Theriault and Martin Overton, Theriault plays, “Covered by cyber Insurance, True or False” with Overton, who once worked for a large cyber insurance company. Overton describes himself as a

“Next Gen” Devices Aren’t Going to Solve Your Current Security Problems

next gen security, cybersecurity

Are you sick of the marketing hype suggesting some “Next Gen” security device can solve all your security problems? Yes? Good. If not, maybe you should be. Let’s pick on the Redmond giant for a moment to illustrate an example. Microsoft announced last month that after a legal victory, it had taken down 99 websites

Regulatory Fines, The Dollars are in the Details

Regulatory Fines, data privacy, GDPR, Cybersecurity framework

I was just speaking with a colleague about the news that Google has been fined the largest penalty to date for failing to comply with GDPR obligations. The penalty was around $56 million USD, but  the Marriott data breach penalty is estimated to be around $1 billion. Why such a discrepancy between the two?  That

Navigating an Unchartered Territory of Cybersecurity.

It was by pure chance that I attended a security symposium at Harvard’s School of Engineering and Applied Sciences (SEAS) several years ago. I don’t know exactly what attracted me to this particular meeting of crypto minds, but it was a very fateful day in my knowledge and understanding of Cybersecurity. Among many of the

Can you see the real me – can you?

Usernames and passwords are being stolen by ‘bad actors’ every day.  Via human engineering exploits, the ‘bad actor’ lures legitimate users into unwittingly surrendering their usernames and passwords. One of the more popular exploits is the well-crafted e-mail messages that warns of service interruption for the recipient’s e-mail service – just click the link and

Along the Fault Line: CA takes on Data Privacy Rights & Silicon Valley Freaks

What’s to worry about California taking on Data Privacy Rights legislation that aims to protect the individual’s data and punish businesses that make their cash by peddling it? Well, it seems that if you Google “California GDPR”, ironically you might find results indicating that Google is none-too-happy, for one. Yes, that’s right, California has passed,

Dangerous SAML SSO vulnerability?

Several sources have recently reported the discovery of a ‘flaw’ in certain SAML implementations that could allow a ‘bad actor’ to alter the identity carried in a Single Sign-On SAML assertion and legitimately log in as a different user as reported by TechTarget. Wow – that’s bad!  That was my initial reaction, and I envisioned

The Importance of Analytics to Cybersecurity

In part 5 of 6 Vlogs, CTI’s Director of Cybersecurity, Ben Thurston makes the connection between cybersecurity monitoring and analytics. Ben explains the importance of analytics in gathering data and information from multiple security sources to provide insight into what is going on from a security/risk posture. Security analytics, like the CTI CustomerUniverse, collects information

A Multi-layered Approach to Securing Data Assets

In this 3rd of 6 Vblogs, CTI’s Ben Thurston explains to Mark Janowicz that there is no one cybersecurity solution that will solve all problems when it comes to data security.  The best approach, Ben explains is a multi-layered one. The data that is owned by your marketing team contains a lot of important and


© Corporate Technologies, Inc.   |  Privacy & Legal