Beyond SWGs (Part 1): Cybersecurity in the Cloud
Enterprises have long relied on secure web gateway (SWG) appliances to enforce appropriate use policies and protect staff and their endpoints from malware. In recent years, however, the SWG market has struggled to cope with cybersecurity issues cloud computing and… Continue reading
After the Breach (Part 1)
As I suggested in my CSA Privacy Heat Index post, the extraordinary volume of privacy abuses in the U.S. may be due not only to its permissive regulations on personal data sharing, but also to its dominance of online… Continue reading
Cyber-Insurance: A Market-Based Approach to Risk Management
Cyber-insurance has never taken off in the industry. But that may be about to change with recent announcements from a major underwriter that a larger pool of policies, and larger policies, than were provided in the past are now going… Continue reading
Privacy By Design – The Case for 1st Party Data Sharing
The vast majority of applications being built today include as a central tenet the ability to hold information about and for their customers in a personal repository. Whether centralized or distributed, their key characteristic is being held by a third-party… Continue reading