News & Events
For educational information and company updates, explore the full range of our news postings. Want to get the news as it's published? Follow us on social media.
What’s All the Buzz About Digital Identity in Canada? Come On, Microchip Implants Don’t Hurt That Much.
The misinformation and disinformation on this subject are laughable on the surface, but sadly it is regressive and detrimental to Canada’s ability to flourish in the 21st Century while competing nations embrace the digital economy. Canadians deserve better than to be held back by baseless claims of a small minority.
The FTC delivered a strong message to Drizly and its CEO: Protect That Data!
The FTC’s decision against Drizly and its CEO, James Cory Rellas, echoed loud and clear: the agency is serious about companies’ protecting consumer’s data privacy, and if a CEO is not going to have direct oversight of the data collected, you need to hire someone to do it for you.
Log4J Vulnerability Still Looms: What We Can Learn from the Past About the Current Risks
Around this time last year (December 9th, to be exact), Apache revealed information regarding a vulnerability with a risk 10.0 CVSS (the HIGHEST possible score). This issue was disclosed during the winter holidays, which is a particularly challenging time to effect technology changes within any organization.
Planning a Trip to the Metaverse? Sounds Cool, but You’ll Need More than a Passport to Keep Data Secure Along the Journey.
It’s not surprising that there’s major buzz about educating through the metaverse! Learning about the human body by venturing into a realistic model of a brain to poke around and see what happens used to only be achievable via a fictional magic school bus, and now it’s at our fingertips as a tangible alternative to reading facts from a textbook. Not only is this uniquely interactive new form of education fascinating in its formulation for piquing students’ interest, but it appeals to the business side of educational institutions as well. Enrollment in higher education has been down due to the pandemic, and this adventurous learning method - a cutting-edge and creative step beyond the typical web-based classroom - may be a way to attract people who don’t want to do brick and mortar but would be open to online learning.
Forging the Path to a Secure Environment: Key Steps for Scaling Organizations
As a small business or a startup, approaching security within your burgeoning company can seem overwhelming. On the journey to this point, you’ve probably come to know what security controls should be in place in some areas, you might know what security controls would be best practices, and you actually know that along the way, you kept a list of where your company is vulnerable. With that information at the ready, the questions are now: Where do I start? How intensely should I be addressing these issues? How do I create a timetable that will balance my resources with my risk?
What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare
With the annual Civitas Conference fast approaching, and compliance always on the minds of many of the attendees, now is an appropriate time to discuss the alphabet soup of identity terms thrown around the healthcare industry. Rest assured, I am not going to cover HIPAA since this audience knows HIPAA has two “A’s” and not two “P’s.”
Starting Strong: How to Best Embark on Your Cybersecurity Journey
Most companies struggle when trying to identify a way to begin their cyber security efforts. Do we start with a tool? Or do we increase security expertise across the team? Finding the right way to begin our journey towards security can be intimidating at first, but once broken down into smaller steps, we begin to see that it’s far more approachable than we thought.
Understanding the Improving Digital Identity Act of 2022
On July 15, 2022, Senators Kyrsten Sinema (D-AZ) and Senator Cynthia Lummis (R- WY) introduced the long-awaited Senate version of The Improving Digital Identity Act. The House version was introduced in June 2021 by Representative Bill Foster (D-IL) and Representative John Katko (R-NY). Bipartisan sister bills in both chambers of Congress is newsworthy itself in 2022, but what it can do for everyday Americans is very promising.
3 Simple Steps to Building a Strong Security Foundation on a Budget
Got security? Does this question have you looking over your shoulder out of an initial sense of concern or uncertainty? For example, do you know if you have 24x7 logging and monitoring? Do you know if users from other countries can access your systems? Is it ok if your developer goes on vacation and logs in? Do you know if you have database or file level encryption? What would happen if your Director of Engineering fell for a phishing scam and a fraudster has their password?
Born to Help: How Kuma’s Jenn Behrens Brings Her Experience in Social Work to Benefit Privacy & Security Clients
When Jenn Behrens was just 2 years old, her dad predicted that she would grow up to be a social worker because of her natural desire and ability to help others. “He always said he knew I was going to take care of people,” she says. He was right: Jenn went on to major in psychology in college and earned a master’s degree in social work — plus a PhD in public policy and administration. She spent more than a decade in direct-service social work like helping foster-care children and families before moving on to program management and oversight.
End of content
No more pages to load