Cyber Chief Magazine: Key strategies on your path towards data security Download Now
25 June, 2019 | Earl Follis

Data Privacy vs. Data Security: What Is the Real Difference?

The importance of cybersecurity has been growing exponentially over the last decade. Today, between persistent threats from cyberattacks such as malware and intrusions, accidental or intentional data loss, and data security regulations that impose stiff penalties on companies who ignore their data...
1 February, 2017 | Jeff Melnick

Data Privacy Day: Contest Results

Hi Guys, Thank you for your participation in our Data Privacy Day contest! We're glad to name our lucky winners: Kevin Rampersad James Churchwell Brian Beckers Each winner gets a $30 ThinkGeek Cards. Congrats! May your data stay secure!  
2 November, 2015 | Sarah Greesonbach

GLBA Compliance to Secure Consumer Data

The Gramm-Leach-Bliley Act (GLBA) was enacted to protect consumer financial information from mistakes within companies that industry process, transfer, and store massive amounts of consumer data. Disregarding the GLBA requirements for secure consumer data can result in a number of serious...
6 April, 2015 | Russell Smith

Monitoring Event Logs with PowerShell

A routine sysadmin task that PowerShell lends itself to is parsing data and text files, and the Windows event logs use XML formatted information that can be easily parsed using the Get-EventLog and Get-WinEvent PowerShell cmdlets. In this article I’m going to show you how to get started using...
11 November, 2014 | Brian Keith Winstead

Backoff Malware: "Unsophisticated" But Effective

Look, I’m not trying to scare you, although I don’t think it’s a bad idea to be a little scared about the current threat level from data breaches. The Backoff malware that’s suspected to be behind most of the big headline breaches over the past year is generally described as not very...
Show more articles