We take a serious look at new privacy regulations, data frameworks, and the return on investment for cybersecurity compliance…Continue Reading: The Data Must Flow (Part 2)
policy
The data must flow (Part 1)
Today, cybersecurity concerns touch most every aspect of business operations as companies and governments have deployed substantial digital assets and vulnerabilities abound…Continue Reading: The data must flow (Part 1)
Increase SMTP security and stop man-in-the-middle attacks with MTA-STS
A short blog exploring the three key stages when deploying MTA-STS; drafting and publishing your policy, Enabling SMTP TLS-RPT & Signalling MTA-STS support…Continue Reading: Increase SMTP security and stop man-in-the-middle attacks with MTA-STS
Data privacy and security: talk less, do more
‘We take your privacy and security seriously’ appears in more than one-third of recent data breach notifications filed in the state of California. …Continue Reading: Data privacy and security: talk less, do more