The Weakest Embedded Link

The Weakest Embedded Link One of the most difficult vulnerabilities to overcome is human error. You cannot simply program your employees to only open specific emails or attachments and there is no guarantee that training will be effective. When it comes to phishing, you are only as strong as the ...

Privacy Ref and CyberDefenses Bring Privacy and Security Together

There is a saying that you can have security without privacy, but you cannot have privacy without security. While privacy and security are both concerned with the protection of information held by an organization, security provides the means to meet the business requirements identified to meet pr...