Blog Archives

Online Privacy and Censorship

Living Free Online: A Basic Guide to Internet Censorship and Privacy

In order to keep our global society open and dynamic, the general principles of online freedom must be upheld, and the average person kept as informed as possible. There is no acceptable justification for government or organizational censorship of the internet.

Read more ›

Posted in censorship, Content, Government Surveilance, Legal, Privacy, Regulatory
Tags: , , , , , ,

SMLR and MIS Launch Partnership

SMLR Group and Merchants Information Solutions, Inc.
Announce a New Strategic Partnership

New Strategic Partnership brings Merchants industry leading SmartIDentity for Business Data Breach Solution to SMLR Group clients.

February 11th, 2016 SMLR Group Press Release – SMLR Group and Merchants Information Solutions,

Read more ›

Posted in Compliance, Content, Customer Engagement, Cyber-Insurance, Cybersecurity, Data Security, Partnerships, Privacy, Risk Management
Tags: , , , , , , ,

Data Breach Planning 101

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

When you have a breach, it’s not just the clients whose information has been stolen you’ll have to answer to… it’s their lawyers… and the regulatory agencies… and THEIR lawyers… and the media… and the court of public opinion.

Read more ›

Posted in Breach, Compliance, Content, Incident Response, Legal, Risk Management
Tags: , , , , , , , ,

Information Security A Concern

Add information security to your data, privacy concerns

by: Mark Pribish, Vice President and ID-theft Practice Leader at Merchants Information Solutions Inc.

Can you really trust the information that is in your desktop, laptop or smart device? I encourage you to re-think any trust you might have,

Read more ›

Posted in Compliance, Content, Cybersecurity, Data Security, Insider Threats, Layered Defense, Risk Management
Tags: , , , , , , , ,

Impact of Data Breach on Your Business

Only by understanding the real impact of a data breach on business can companies protect themselves

by James Pattinson, Vice President, EMEA, Absolute

The concept of a data breach is becoming worryingly common to anyone with even a passing interest in the news.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Financials, Hacks, Insider Threats, Legal, Risk Management
Tags: , , , , , , , , , , ,

Multi-Factor Authentication is a Must

Why Your Business Needs Multi-Factor Authentication

July 23, 2015
Multi-factor Authentication helps keep your eggs out of a single basket.Multi-factor Authentication helps keep your eggs out of a single basket.

There’s a good reason why leading SMBs are using multi-factor authentication (also known as “two factor authentication”,

Read more ›

Posted in Compliance, Content, Cybersecurity, Layered Defense, Multi-Factor Authentication, Phishing, Privacy
Tags: , , , , , , ,

Chilling Effect Impact

Surveillance, First Amendment Rights and the “Chilling Effect”

by Curt Monash of The Monash Report

In which I observe that Tim Cook and the EFF, while thankfully on the right track, haven’t gone nearly far enough.

Traditionally, the term “chilling effect” referred specifically to inhibitions on what in the US are regarded as First Amendment rights — the freedoms of speech,

Read more ›

Posted in Content, Governent Oversight, Government Surveilance, Incident Response, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , ,

CFPB – Enforcing Compliance with a Vengeance

CFPB – High risk… Hefty Fines!

by: Dennis Dissick, Adjunct Professor, New York University Polytechnic Institute / Area Director, Eastern Region, SMLR Group, Inc.

‘Tis the season for regulation…IRS, DOJ, FTC, state AGs, and now the CFPB all make sure that regulations and audits are a year round adventure.

Read more ›

Posted in Compliance, Content, Continuous Monitoring, Cybersecurity, Governent Oversight, Insider Threats, Layered Defense, Legal, Risk Management, Vendor Compliance
Tags: , , , , , , , , , ,

Why Cyberfy Beats the Competition

Cyberfy: The Future of Smart Phone ID Authentication

by: Yona Fink, CEO Cyberfy

The field is quickly filling up with biometric ID authentication apps, but Cyberfy still holds a lead. Why?

Apple’s Touch ID and EyeVerify (both of which I know,

Read more ›

Posted in Content, Cybersecurity, Encryption, Fraud, Layered Defense, Legal, Mobile, Risk Management
Tags: , , , , , , , ,

The Superiority of the Associative Database

Why is an Associative Database (AtomicDB) Far Superior to a Relational Database (SQL, DB2, etc.)?

by Dennis Dissick, Adjunct Professor, New York University Polytechnic Institute

The associative database model has been enhanced to reflect the business needs of today’s real-world imperatives. The more traditional data models,

Read more ›

Posted in AtomicDB, Big Data, Content, Data Solutions, Data Structure, Optimization
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: