Data Protection


By Peter Kelley OneTrust, a fast-growing data privacy, compliance and governance enterprise platform backed by leading VCs, has acquired Shared Assessments, the global membership organization dedicated to developing the best practices, education, and tools to drive third-party risk assurance.  Recent global events such as the COVID-19 pandemic and Solar Winds […]

OneTrust Acquires Shared Assessments, Third-Party Risk Management Leaders


By Brian Stone, SVP Customer Success, FairWarning & Elizabeth Champion, VP and Chief Compliance Officer, FMOLHS From ensuring an organization meets regulatory requirements to preserving personal health information (PHI), healthcare compliance teams face a myriad of challenges to safeguard patient data. Oftentimes privacy, compliance, and security departments are siloed across […]

Working in Harmony to Create a Culture of Compliance


By Muhammad Tariq Ahmed Khan, Head of Cybersecurity Audit, Internal Audit Division, Arab National Bank There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, address, contact details, marriage, and holiday plans on social media. […]

Data Privacy, Good Governance, and Controls




Secures Users and Their Organization’s Network Against Attacks that VPNs Can’t Protect Against By Jeff Steuart COVID-19 continues to drive work-from-home, and more organizations are striving to sustain and bolster security and compliance as a result.  Byos™’ introduction of its new μGateway™ (“micro-gateway”) gives organizations a new means to secure […]

Byos μGateway Brings New Security to Remote Networking, Enabling Zero ...


By Ezra Vazquez-D’Amico, Manager of GiveSafely.io The last four years have seen a growing awareness about the value of personal data and how exposed individuals are to nefarious forces, abuse, and hacks. With tech giants reaching multi-billion dollar valuations based on their monetization of personal data, coupled with high profile hacks and […]

How Data Decentralization, Encryption, and Security Can Enhance Trust in ...




“LiveAuctioneers, the online website which broadcasts live auctions selling antiques, art, and collectibles, has warned that user details have fallen into unauthorized hands following a security breach,” reported by Graham Cluley last week. A notification on LiveAuctioneers website states, “As of July 11th, 2020, our cybersecurity team has confirmed that […]

Online Auctions Site “Completely Failed Its Customers”


To be sure, contact tracing for infectious diseases is not new. This practice is vital for combating contagious viruses and has been around for a very long time, so why the controversy about it now? In bygone eras, if you were afflicted with an infectious disease, you would likely sit […]

Contact Tracing and Privacy



One of the notable perks for a journalist covering the security industry is the occasional opportunity to test and review security products and solutions. Over the last couple of weeks, I have had the chance to try three products from Kingston Technology and I am happy to provide Brilliance Security […]

Device Review – Kingston DataTraveler and Nucleum Devices


By Ian Lancaster, founder and former managing director of Reconnaissance International and lead author and editor of ‘Physical to Digital: A Revolution in Document Security’ A revolution is underway in the secured document field. Society is migrating from using physical secured documents, such as banknotes and identity cards, to the […]

Digital Document Revolution: A Cautionary Note


Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management