News & Events

For educational information and company updates, explore the full range of our news postings. Want to get the news as it's published? Follow us on social media.

Protecting Privacy While Promoting Health

In this vast and multifaceted landscape, we at Kuma have had the privilege of learning from 3 prominent SBEs from around the country about their privacy and security best practices. One can look to some of the following SBE privacy models for guidance and inspiration in designing their own privacy programs.
Read More

Protecting Privacy While Promoting Health


March Madness for Business: How to Manage Privacy in the Face of Game Changers like ChatGBT and Kroger Data

The end of the first quarter of 2023 is rapidly approaching, and in that short span of time many things have already created big changes in and around the privacy world. The swift and powerful emergence of AI programs like ChatGPT is is looking to be one of the most impactful, and what many of us know and love about basketball can inspire our successful implementation of it to help our businesses thrive. 
Read More

March Madness for Business: How to Manage Privacy in the Face of Game Changers like ChatGBT and Kroger Data

What’s All the Buzz About Digital Identity in Canada?  Come On, Microchip Implants Don’t Hurt That Much. 

The misinformation and disinformation on this subject are laughable on the surface, but sadly it is regressive and detrimental to Canada’s ability to flourish in the 21st Century while competing nations embrace the digital economy.  Canadians deserve better than to be held back by baseless claims of a small minority. 
Read More

What’s All the Buzz About Digital Identity in Canada?  Come On, Microchip Implants Don’t Hurt That Much. 

The FTC delivered a strong message to Drizly and its CEO: Protect That Data!

The FTC’s decision against Drizly and its CEO, James Cory Rellas, echoed loud and clear: the agency is serious about companies’ protecting consumer’s data privacy, and if a CEO is not going to have direct oversight of the data collected, you need to hire someone to do it for you.
Read More

The FTC delivered a strong message to Drizly and its CEO: Protect That Data!

Log4J Vulnerability Still Looms: What We Can Learn from the Past About the Current Risks

Around this time last year (December 9th, to be exact), Apache revealed information regarding a vulnerability with a risk 10.0 CVSS (the HIGHEST possible score). This issue was disclosed during the winter holidays, which is a particularly challenging time to effect technology changes within any organization.
Read More

Log4J Vulnerability Still Looms: What We Can Learn from the Past About the Current Risks

Planning a Trip to the Metaverse? Sounds Cool, but You’ll Need More than a Passport to Keep Data Secure Along the Journey.

It’s not surprising that there’s major buzz about educating through the metaverse! Learning about the human body by venturing into a realistic model of a brain to poke around and see what happens used to only be achievable via a fictional magic school bus, and now it’s at our fingertips as a tangible alternative to reading facts from a textbook. Not only is this uniquely interactive new form of education fascinating in its formulation for piquing students’ interest, but it appeals to the business side of educational institutions as well. Enrollment in higher education has been down due to the pandemic, and this adventurous learning method - a cutting-edge and creative step beyond the typical web-based classroom - may be a way to attract people who don’t want to do brick and mortar but would be open to online learning.  
Read More

Planning a Trip to the Metaverse?  Sounds Cool, but You’ll Need More than a Passport to Keep Data Secure Along the Journey.

Forging the Path to a Secure Environment: Key Steps for Scaling Organizations

As a small business or a startup, approaching security within your burgeoning company can seem overwhelming. On the journey to this point, you’ve probably come to know what security controls should be in place in some areas, you might know what security controls would be best practices, and you actually know that along the way, you kept a list of where your company is vulnerable. With that information at the ready, the questions are now: Where do I start? How intensely should I be addressing these issues? How do I create a timetable that will balance my resources with my risk?
Read More

Forging the Path to a Secure Environment: Key Steps for Scaling Organizations

What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare

With the annual Civitas Conference fast approaching, and compliance always on the minds of many of the attendees, now is an appropriate time to discuss the alphabet soup of identity terms thrown around the healthcare industry. Rest assured, I am not going to cover HIPAA since this audience knows HIPAA has two “A’s” and not two “P’s.”   
Read More

What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare

Starting Strong: How to Best Embark on Your Cybersecurity Journey

Most companies struggle when trying to identify a way to begin their cyber security efforts. Do we start with a tool? Or do we increase security expertise across the team? Finding the right way to begin our journey towards security can be intimidating at first, but once broken down into smaller steps, we begin to see that it’s far more approachable than we thought.
Read More

Starting Strong: How to Best Embark on Your Cybersecurity Journey

End of content

No more pages to load