No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity
Dark Web Monitoring - Unauthorized Access Podcast
The ABA/ABA Financial Crimes Enforcement Conference took place January 11-13, with K2 Integrity Managing Director Gabriel Hidalgo, who leads the firm’s Crypto and Fintech Advisory practice, leading an important conversation...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
As most of you know, I rarely download an app. However, here’s one I just downloaded and here’s why. The Jumbo Privacy app, available in the Apple store, is all about providing consumers with a way to audit their privacy and...more
The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more
Verizon recently issued its Protected Health Information (PHI) Data Breach Report, which is always an interesting read. Not surprisingly, Verizon’s report concludes that based upon analysis of 1,360 security incidents...more