Your business may want to jump on the Generative AI (GAI) bandwagon and discover how your company may become more productive, competitive, reduce costs, and make the most of new technology. There are many intriguing and...more
9/16/2024
/ Algorithms ,
Artificial Intelligence ,
Automation Systems ,
Compliance ,
Corporate Governance ,
Incident Response Plans ,
Innovative Technology ,
Machine Learning ,
Risk Assessment ,
Risk Management ,
Transparency
Businesses can breathe a little easier now that one of the world’s top five ransomware networks, the Hive, has been infiltrated and disbanded by the FBI....more
2/15/2023
/ Criminal Investigations ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Enforcement Actions ,
FBI ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
This article is intended to provide an outline summary of some of the key elements of the California Consumer Privacy Act (“CCPA”), including determining if your business is subject to CCPA and what are its primary...more
2/6/2020
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Deletion ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Sellers ,
Information Governance ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Privacy Policy ,
Right to Delete ,
Risk Management ,
State and Local Government
The National Institute of Standards and Technology (“NIST”), an agency within the U.S. Department of Commerce, has produced a number of detailed standards for various aspects of information security. These standards outline...more
Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more