Blog

The One Takeaway from VMworld that Storage Drive Users Need to be Aware of

VMworld 2018 started off with a lot of fanfare. VMware CEO Pat Gelsinger kicked the conference off with some mind-boggling statistics: With more than 7,500 customers, VMware NSX has achieved a substantial market leadership position in the software-defined network category – ten times larger than its closest customer. Additionally, VMware’s vSAN software, which is a…

Read More

What is California AB 375, and What Does it Mean for You?

What is the California Data Breach Notification Law (AB 375)? The threat of data breaches in the United States continues to rise, along with the potential impact on the lives of the average consumer. The state of California has led most states in enacting legislation to protect consumers from identity theft, and in fact became…

Read More

What is Foreshadow, and How Can You Overcome this Vulnerability?

What is Foreshadow, and How Can You Overcome this Vulnerability? Earlier this month it was revealed that another vulnerability – the fourth – was discovered in Intel’s x86 chip architecture. Researchers in Belgium originally alerted Intel to this flaw, initially dubbed Foreshadow NG. Intel subsequently discovered an additional Foreshadow flaw in January 2018 but did…

Read More

The Seven Security Sessions Not to Miss at VMworld 2018

  Are you attending VMworld 2018? If you’re attending VMworld 2018 and trying to weed through the 600+ sessions to decide what to attend it can be daunting. You only have a limited about of time to get the information you need. To help, we’ve compiled the top seven presentations for anyone interested in application…

Read More

Everything You Need to Know About Cyber Insurance Policy Coverage

As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other business services, the need for cyber insurance is becoming more important. However, paying attention to the details is crucial to understanding what kind of insurance an organization requires and under what circumstances reimbursement is declined. In a…

Read More

The FTC: The Law and Order of Cyber Attacks

Understanding the FTC’s Role in the investigation and enforcement of cyber attacks In a previous blog, we discussed the FTC and its role in enforcing various data privacy policies. In this article, we’ll take a closer look at how it developed into the main cyber enforcement body, how it assesses liability, and a sample of…

Read More

The Instrumental Role that FTC Plays in Data Privacy Policy and Enforcement

There are always interesting and insightful presentations at the RSA security conference, and this year was no exception. However, there was one session that really captured our attention: “Cybersecurity and Data Breaches from a Business Lawyer’s Perspective.” This was presented by Kathy Winger, a practicing business attorney who provides guidance on data privacy laws and…

Read More

How CSPi helped Broward College get out of the IT business

Making a bold move away from traditional IT enables Broward College to embrace its Cloud First vision and the business of helping students succeed. What do you do when a client comes to you with big aspirations and an ambitious vision but is constrained by the realities of its sector? You find a way to…

Read More