Blog

What is California AB 375, and What Does it Mean for You?

California has led most states in enacting legislation to protect consumers from identity theft. California’s Data Breach Notification Law was the first of its kind to protect consumers. Yet, California has now gone a step further by introducing a new security law, AB 375. In this article, we take a look at both of these…

Read More

What is Foreshadow, and How Can You Overcome this Vulnerability?

Earlier this month, it was revealed that another security vulnerability – the fourth one – was discovered in Intel’s x86 chip architecture. In this article, we take a closer look at Intel’s latest x86 vulnerability, called Foreshadow, including why current security approaches aren’t working, and details on how CSPi’s new solutions can help overcome these…

Read More

The Seven Security Sessions Not to Miss at VMworld 2018

If you’re going to VMworld 2018, there are a few sessions that you really need to attend, including sessions relating to Application Security, Secure DevOps, and “Office of the CTO”. Check out the 7 security sessions you really can’t afford to miss while you are there. Plus, we hope you can make time to visit…

Read More

Everything You Need to Know About Cyber Insurance Policy Coverage

As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other business services, the need for cyber insurance is becoming more important. However, paying attention to the details is crucial to understanding what kind of insurance an organization requires and under what circumstances reimbursement is declined. Here are…

Read More

The FTC: The Law and Order of Cyber Attacks

In a previous article, we discussed the FTC and its role in enforcing various data privacy policies. In this article, we will take a closer look at how the FTC developed into the main cyber enforcement body. Plus, we will review several high-profile security lapses and try to explain what is a reasonable cyber security…

Read More

The Instrumental Role that FTC Plays in Data Privacy Policy and Enforcement

There are always interesting and insightful presentations at the RSA security conference, and this year was no exception. However, there was one session that really captured our attention: “Cybersecurity and Data Breaches from a Business Lawyer’s Perspective.” This was presented by Kathy Winger, a practicing business attorney who provides guidance on data privacy laws and…

Read More

How CSPi Helped Broward College Get Out of the IT Business

Making a bold move away from traditional IT enables Broward College to embrace its Cloud First vision and the business of helping students succeed. What do you do when a client comes to you with big aspirations and an ambitious vision but is constrained by the realities of its sector? You find a way to…

Read More

What is the 23 NYCRR 500 Regulation?

In prior blogs, we discussed the rise of data privacy regulations across all industries and how it has been challenging for organizations to stay on top of the varying and conflicting requirements. In this blog, we take a look at New York’s law – 23 NYCRR 500 – that has a high impact on the…

Read More

How-to Guide: Successfully Complying with Data Privacy Regulations.
Download Now