News & Events

For educational information and company updates, explore the full range of our news postings. Want to get the news as it's published? Follow us on social media.

March Madness for Business: How to Manage Privacy in the Face of Game Changers like ChatGBT and Kroger Data

The end of the first quarter of 2023 is rapidly approaching, and in that short span of time many things have already created big changes in and around the privacy world. The swift and powerful emergence of AI programs like ChatGPT is is looking to be one of the most impactful, and what many of us know and love about basketball can inspire our successful implementation of it to help our businesses thrive. 
Read More

March Madness for Business: How to Manage Privacy in the Face of Game Changers like ChatGBT and Kroger Data

What’s All the Buzz About Digital Identity in Canada?  Come On, Microchip Implants Don’t Hurt That Much. 

The misinformation and disinformation on this subject are laughable on the surface, but sadly it is regressive and detrimental to Canada’s ability to flourish in the 21st Century while competing nations embrace the digital economy.  Canadians deserve better than to be held back by baseless claims of a small minority. 
Read More

What’s All the Buzz About Digital Identity in Canada?  Come On, Microchip Implants Don’t Hurt That Much. 

The FTC delivered a strong message to Drizly and its CEO: Protect That Data!

The FTC’s decision against Drizly and its CEO, James Cory Rellas, echoed loud and clear: the agency is serious about companies’ protecting consumer’s data privacy, and if a CEO is not going to have direct oversight of the data collected, you need to hire someone to do it for you.
Read More

The FTC delivered a strong message to Drizly and its CEO: Protect That Data!

Log4J Vulnerability Still Looms: What We Can Learn from the Past About the Current Risks

Around this time last year (December 9th, to be exact), Apache revealed information regarding a vulnerability with a risk 10.0 CVSS (the HIGHEST possible score). This issue was disclosed during the winter holidays, which is a particularly challenging time to effect technology changes within any organization.
Read More

Log4J Vulnerability Still Looms: What We Can Learn from the Past About the Current Risks

Planning a Trip to the Metaverse? Sounds Cool, but You’ll Need More than a Passport to Keep Data Secure Along the Journey.

It’s not surprising that there’s major buzz about educating through the metaverse! Learning about the human body by venturing into a realistic model of a brain to poke around and see what happens used to only be achievable via a fictional magic school bus, and now it’s at our fingertips as a tangible alternative to reading facts from a textbook. Not only is this uniquely interactive new form of education fascinating in its formulation for piquing students’ interest, but it appeals to the business side of educational institutions as well. Enrollment in higher education has been down due to the pandemic, and this adventurous learning method - a cutting-edge and creative step beyond the typical web-based classroom - may be a way to attract people who don’t want to do brick and mortar but would be open to online learning.  
Read More

Planning a Trip to the Metaverse?  Sounds Cool, but You’ll Need More than a Passport to Keep Data Secure Along the Journey.

Forging the Path to a Secure Environment: Key Steps for Scaling Organizations

As a small business or a startup, approaching security within your burgeoning company can seem overwhelming. On the journey to this point, you’ve probably come to know what security controls should be in place in some areas, you might know what security controls would be best practices, and you actually know that along the way, you kept a list of where your company is vulnerable. With that information at the ready, the questions are now: Where do I start? How intensely should I be addressing these issues? How do I create a timetable that will balance my resources with my risk?
Read More

Forging the Path to a Secure Environment: Key Steps for Scaling Organizations

What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare

With the annual Civitas Conference fast approaching, and compliance always on the minds of many of the attendees, now is an appropriate time to discuss the alphabet soup of identity terms thrown around the healthcare industry. Rest assured, I am not going to cover HIPAA since this audience knows HIPAA has two “A’s” and not two “P’s.”   
Read More

What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare

Starting Strong: How to Best Embark on Your Cybersecurity Journey

Most companies struggle when trying to identify a way to begin their cyber security efforts. Do we start with a tool? Or do we increase security expertise across the team? Finding the right way to begin our journey towards security can be intimidating at first, but once broken down into smaller steps, we begin to see that it’s far more approachable than we thought.
Read More

Starting Strong: How to Best Embark on Your Cybersecurity Journey

Understanding the Improving Digital Identity Act of 2022

On July 15, 2022, Senators Kyrsten Sinema (D-AZ) and Senator Cynthia Lummis (R- WY) introduced the long-awaited Senate version of The Improving Digital Identity Act.  The House version was introduced in June 2021 by Representative Bill Foster (D-IL) and Representative John Katko (R-NY).  Bipartisan sister bills in both chambers of Congress is newsworthy itself in 2022, but what it can do for everyday Americans is very promising. 
Read More

Understanding the Improving Digital Identity Act of 2022

3 Simple Steps to Building a Strong Security Foundation on a Budget

Got security? Does this question have you looking over your shoulder out of an initial sense of concern or uncertainty? For example, do you know if you have 24x7 logging and monitoring? Do you know if users from other countries can access your systems? Is it ok if your developer goes on vacation and logs in? Do you know if you have database or file level encryption? What would happen if your Director of Engineering fell for a phishing scam and a fraudster has their password?
Read More

3 Simple Steps to Building a Strong Security Foundation on a Budget

End of content

No more pages to load