22 10, 2020

Cloud Security: Advantages and Disadvantages to Third-Party Data Storage

By |2020-10-22T10:01:34-07:00October 22nd, 2020|Categories: Blog, Secure Compliant Data Platform|

The competition for product and services companies can require that data and applications be protected to the same degree or higher than government secrets. Bad actors can threaten the financial foundations of a company and its reputation. However, meeting the necessary level of security is not easy since it requires [...]

15 10, 2020

Cloud Security Vulnerabilities: A Step-by-Step Plan for Quelling Threats

By |2020-10-15T12:28:05-07:00October 15th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

When referring to the global network of computing resources that house and drive data and information interchanges today, many use the term “cloud” or “cloud computing.” From a holistic vantage point, this nomenclature has merit similar to that of the expression network used when describing a LAN, WAN, or MAN. [...]

8 10, 2020

Leveraging Compliance Automation Tools to Mitigate Risk

By |2020-10-08T11:27:37-07:00October 8th, 2020|Categories: Blog, Secure Compliant Data Platform|

There are precious few things in life that can be undertaken without some degree of concern, consternation, or outright fear of an undesirable outcome or effect. For example, the current COVID-19 pandemic has heightened apprehension in a range of ways, from simple activities such as dining out to complex ones [...]

6 10, 2020

Data Security for Banks: Standards for Success

By |2020-10-06T11:25:28-07:00October 6th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

Data breaches are perhaps the single most significant risk that banks face today. In the financial industry, the cost per data breach averaged about $5.85 million in 2020. Aside from the direct costs involved in these breaches, like lost funds, increased insurance expenses and fines, and penalties, institutions also must [...]

15 09, 2020

Prioritizing Data Security Compliance Throughout a Cloud Migration

By |2020-09-15T09:08:46-07:00September 15th, 2020|Categories: Blog, Secure Compliant Data Platform|

Irrespective of what widgets or services your organization provides to its customers, success is not possible without good management. Defining explicitly what good management entails is not a simple exercise, yet there are certain qualities and actions that successful executives and managers seem to possess and employ. Critically, knowing what [...]

12 02, 2019

Security Automation in OT Networks

By |2019-10-31T15:19:09-07:00February 12th, 2019|Categories: Secure Compliant Data Platform, Secure Software Development|Tags: , , , |

Last week at DistribuTECH 2019, I had the opportunity to participate in a panel discussion on How AI and Machine-to-Machine Learning Are Enabling Cybersecurity Threat Intelligence. I was joined by fellow members of the California Energy Systems for the 21st Century (CES-21) program. Over the past 4 years, [...]

Go to Top