Posts Categorized: Security

What is Foreshadow, and How Can You Overcome this Vulnerability?

Earlier this month, it was revealed that another security vulnerability – the fourth one – was discovered in Intel’s x86 chip architecture. In this article, we take a closer look at Intel’s latest x86 vulnerability, called Foreshadow, including why current security approaches aren’t working, and details on how CSPi’s new solutions can help overcome these…

Read More

The Seven Security Sessions Not to Miss at VMworld 2018

If you’re going to VMworld 2018, there are a few sessions that you really need to attend, including sessions relating to Application Security, Secure DevOps, and “Office of the CTO”. Check out the 7 security sessions you really can’t afford to miss while you are there. Plus, we hope you can make time to visit…

Read More

Everything You Need to Know About Cyber Insurance Policy Coverage

As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other business services, the need for cyber insurance is becoming more important. However, paying attention to the details is crucial to understanding what kind of insurance an organization requires and under what circumstances reimbursement is declined. Here are…

Read More

The FTC: The Law and Order of Cyber Attacks

In a previous article, we discussed the FTC and its role in enforcing various data privacy policies. In this article, we will take a closer look at how the FTC developed into the main cyber enforcement body. Plus, we will review several high-profile security lapses and try to explain what is a reasonable cyber security…

Read More

The Instrumental Role that FTC Plays in Data Privacy Policy and Enforcement

There are always interesting and insightful presentations at the RSA security conference, and this year was no exception. However, there was one session that really captured our attention: “Cybersecurity and Data Breaches from a Business Lawyer’s Perspective.” This was presented by Kathy Winger, a practicing business attorney who provides guidance on data privacy laws and…

Read More

What is the 23 NYCRR 500 Regulation?

In prior blogs, we discussed the rise of data privacy regulations across all industries and how it has been challenging for organizations to stay on top of the varying and conflicting requirements. In this blog, we take a look at New York’s law – 23 NYCRR 500 – that has a high impact on the…

Read More

Sorry for the Inconvenience

The Breaches Just Keep Coming (and So Do the Ramifications) Recent high-profile data breaches prove that the problem is getting worse, not better. If traditional security tools and approaches aren’t working, what can companies do to protect themselves from the next data security breach? The Breaches Just Keep Coming (and So Do the Data Breach…

Read More

Not All Incidents Are Created Equal

Not All Intrusion Alerts and IT Incidents are Created Equal With all the intrusion alerts received in a day, it is important for companies to define from their perspective – What exactly is a security incident? And more important, what can organizations do to improve their incident response approach? This article takes a look and…

Read More

CSPi Expands Partner Network Domestically and Internationally with Additions of Egoseal and Chestnut Hill Technologies
Learn More