News & Events
For educational information and company updates, explore the full range of our news postings. Want to get the news as it's published? Follow us on social media.
Starting Strong: How to Best Embark on Your Cybersecurity Journey
Most companies struggle when trying to identify a way to begin their cyber security efforts. Do we start with a tool? Or do we increase security expertise across the team? Finding the right way to begin our journey towards security can be intimidating at first, but once broken down into smaller steps, we begin to see that it’s far more approachable than we thought.
Understanding the Improving Digital Identity Act of 2022
On July 15, 2022, Senators Kyrsten Sinema (D-AZ) and Senator Cynthia Lummis (R- WY) introduced the long-awaited Senate version of The Improving Digital Identity Act. The House version was introduced in June 2021 by Representative Bill Foster (D-IL) and Representative John Katko (R-NY). Bipartisan sister bills in both chambers of Congress is newsworthy itself in 2022, but what it can do for everyday Americans is very promising.
3 Simple Steps to Building a Strong Security Foundation on a Budget
Got security? Does this question have you looking over your shoulder out of an initial sense of concern or uncertainty? For example, do you know if you have 24x7 logging and monitoring? Do you know if users from other countries can access your systems? Is it ok if your developer goes on vacation and logs in? Do you know if you have database or file level encryption? What would happen if your Director of Engineering fell for a phishing scam and a fraudster has their password?
Born to Help: How Kuma’s Jenn Behrens Brings Her Experience in Social Work to Benefit Privacy & Security Clients
When Jenn Behrens was just 2 years old, her dad predicted that she would grow up to be a social worker because of her natural desire and ability to help others. “He always said he knew I was going to take care of people,” she says. He was right: Jenn went on to major in psychology in college and earned a master’s degree in social work — plus a PhD in public policy and administration. She spent more than a decade in direct-service social work like helping foster-care children and families before moving on to program management and oversight.
Kuma is the world’s first and only assessor to offer identity certifications for both the US and Canada
Kuma LLC, a global privacy, security, and identity company specializing in custom cybersecurity solutions, is pleased to announce their accreditation by the Digital Identity and Authentication Council of Canada as the first DIACC certified assessor and Readiness Advisor in the DIACC Voilà Verified Trustmark program. Building upon their success as the global market leader in NIST 800 63-3 assessments, Kuma is now the world’s first and only assessor to offer identity certifications for both the US and Canada, with certification for the UK’s Digital Identity and Attributed Trust Framework planned.
Digital Identity Certifications & Trustmarks are Not Just for Government Business Anymore: Why Risk Future Business Without Them?
As one peruses various vendor websites in the global identity and access management industry, words like "security", "trust", "privacy", and "secure" leap off the home pages. While each vendor does its best to differentiate itself from the pack, buyers are challenged to identify the “haves” from the “have nots” when it comes to meeting their unique internal or customer requirements, or complying with regulations in the jurisdictions they do business in.
Beyond the Buzzword: What is the ‘Zero Trust Model’ and Why is it Essential?
To help understand the relatively new concept of the Zero Trust Model when it comes to data privacy and security, think of something very old: a castle from the Middle Ages. The traditional approach to security called for high walls, a moat, and a drawbridge all meant to fend off an outside attack. Those allowed inside the castle walls were considered trusted and had unchecked access. Applying the Zero Trust Model, the exterior barriers would remain, but additional interior measures would track everyone’s movements throughout the castle and reconfirm authorization prior to accessing any room.
Consent is the “Little Black Dress” of Privacy
Just as the LBD could be considered an anchor of a woman’s closet – if not of the women’s fashion world in general – consent could be argued to be the LBD of the privacy world. Every organization collecting personal information needs consent to do it. It’s the baseline authority mechanism for collecting, processing, storing and transferring that personal information. Consent is needed by government agencies, financial services companies, healthcare organizations, cloud communication providers, ride share platforms, online retailers, and everything in between.
Why Kuma Believes in ‘The Art of Approachable Privacy’
“The Art of Approachable Privacy is a phrase I didn’t hear until I came to Kuma, and it’s truly one of the key advantages we have because it shows how we work with clients to set up and implement privacy programs that educate and empower employees,” Theo says. “It’s about — exactly as it says — making privacy approachable and not so scary that it seems insurmountable. Once you establish that. . . .
Data Privacy Day: The Origin Story
There’s a reason for this day! It is to celebrate the recognition of privacy, data protection, and freedom of expression. In 2007, the Council of Europe and the US House of Representatives each declared that the original signing date of a very important international convention would be recognized as Data Privacy Day. This was the date the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (‘Convention 108’) was signed on the 28th of January in 1981
End of content
No more pages to load