Data Protection


By Brian Stone, SVP Customer Success, FairWarning & Elizabeth Champion, VP and Chief Compliance Officer, FMOLHS From ensuring an organization meets regulatory requirements to preserving personal health information (PHI), healthcare compliance teams face a myriad of challenges to safeguard patient data. Oftentimes privacy, compliance, and security departments are siloed across […]

Working in Harmony to Create a Culture of Compliance


By Muhammad Tariq Ahmed Khan, Head of Cybersecurity Audit, Internal Audit Division, Arab National Bank There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, address, contact details, marriage, and holiday plans on social media. […]

Data Privacy, Good Governance, and Controls




Secures Users and Their Organization’s Network Against Attacks that VPNs Can’t Protect Against By Jeff Steuart COVID-19 continues to drive work-from-home, and more organizations are striving to sustain and bolster security and compliance as a result.  Byos™’ introduction of its new μGateway™ (“micro-gateway”) gives organizations a new means to secure […]

Byos μGateway Brings New Security to Remote Networking, Enabling Zero ...


By Ezra Vazquez-D’Amico, Manager of GiveSafely.io The last four years have seen a growing awareness about the value of personal data and how exposed individuals are to nefarious forces, abuse, and hacks. With tech giants reaching multi-billion dollar valuations based on their monetization of personal data, coupled with high profile hacks and […]

How Data Decentralization, Encryption, and Security Can Enhance Trust in ...




“LiveAuctioneers, the online website which broadcasts live auctions selling antiques, art, and collectibles, has warned that user details have fallen into unauthorized hands following a security breach,” reported by Graham Cluley last week. A notification on LiveAuctioneers website states, “As of July 11th, 2020, our cybersecurity team has confirmed that […]

Online Auctions Site “Completely Failed Its Customers”


To be sure, contact tracing for infectious diseases is not new. This practice is vital for combating contagious viruses and has been around for a very long time, so why the controversy about it now? In bygone eras, if you were afflicted with an infectious disease, you would likely sit […]

Contact Tracing and Privacy


One of the notable perks for a journalist covering the security industry is the occasional opportunity to test and review security products and solutions. Over the last couple of weeks, I have had the chance to try three products from Kingston Technology and I am happy to provide Brilliance Security […]

Device Review – Kingston DataTraveler and Nucleum Devices



By Ian Lancaster, founder and former managing director of Reconnaissance International and lead author and editor of ‘Physical to Digital: A Revolution in Document Security’ A revolution is underway in the secured document field. Society is migrating from using physical secured documents, such as banknotes and identity cards, to the […]

Digital Document Revolution: A Cautionary Note


Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management


The use of encryption to protect against cyber threats is growing exponentially. Unfortunately, cybercriminals also leverage encryption to hide malware, ransomware, and other attacks.  Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As […]

Analyzing Encrypted Network Traffic