Data Privacy is not an Illusion, but the Solution might be

We have all been exposed, if not inundated, with the fact that so much of our personal information has been systematically harvested for years. Both with and without our knowledge or consent. Combine this with a never-ending stream of data breaches that have left vast amounts of our personal lives scattered about the dark web

Navigating an Unchartered Territory of Cybersecurity.

It was by pure chance that I attended a security symposium at Harvard’s School of Engineering and Applied Sciences (SEAS) several years ago. I don’t know exactly what attracted me to this particular meeting of crypto minds, but it was a very fateful day in my knowledge and understanding of Cybersecurity. Among many of the

Can you see the real me – can you?

Usernames and passwords are being stolen by ‘bad actors’ every day.  Via human engineering exploits, the ‘bad actor’ lures legitimate users into unwittingly surrendering their usernames and passwords. One of the more popular exploits is the well-crafted e-mail messages that warns of service interruption for the recipient’s e-mail service – just click the link and

Dark Web? We don’t need no stinking Dark Web…

Wait what? Need the Dark Web? What are you talking about? The truth is so much information about you is already available in all the places where it’s supposed to be secure. Imagine for a second that your personal information only existed in the Dark Web.  Ironically, it might really be less accessible – well

Along the Fault Line: CA takes on Data Privacy Rights & Silicon Valley Freaks

What’s to worry about California taking on Data Privacy Rights legislation that aims to protect the individual’s data and punish businesses that make their cash by peddling it? Well, it seems that if you Google “California GDPR”, ironically you might find results indicating that Google is none-too-happy, for one. Yes, that’s right, California has passed,

Cybersecurity Starts at the Top

  A majority of an organization’s information is now stored and transferred in digital form creating an extremely urgent need for them to secure their data. The integrity of this digital information is constantly being challenged by attacks aimed at stealing, exposing or manipulating it. This hostile environment affects all industries, from healthcare to finance

Next-Gen Malware Will Own You

Imagine a ransomware that can get past your endpoint protection, disable Windows Defender, shutdown the host firewall, connect to USB drives, disables access to various executables, encrypts your files and plants its own master boot record and its own boot loader. Not cool, right? How about if it were done just for kicks? Some ransomware

Dangerous SAML SSO vulnerability?

Several sources have recently reported the discovery of a ‘flaw’ in certain SAML implementations that could allow a ‘bad actor’ to alter the identity carried in a Single Sign-On SAML assertion and legitimately log in as a different user as reported by TechTarget. Wow – that’s bad!  That was my initial reaction, and I envisioned

The Importance of Analytics to Cybersecurity

In part 5 of 6 Vlogs, CTI’s Director of Cybersecurity, Ben Thurston makes the connection between cybersecurity monitoring and analytics. Ben explains the importance of analytics in gathering data and information from multiple security sources to provide insight into what is going on from a security/risk posture. Security analytics, like the CTI CustomerUniverse, collects information

A Multi-layered Approach to Securing Data Assets

In this 3rd of 6 Vblogs, CTI’s Ben Thurston explains to Mark Janowicz that there is no one cybersecurity solution that will solve all problems when it comes to data security.  The best approach, Ben explains is a multi-layered one. The data that is owned by your marketing team contains a lot of important and