Henry Newman

2 Posts

GDPR Will Change Security and Privacy Everywhere

You've probably read a lot about the EU's General Data Protection Regulation (GDPR) and the enormous fines organizations could face for violations...

The Software Supply Chain: Where Security Starts

Concern about software supply chain security and the potential insertion of malware backdoors is at the forefront of cyber security challenges, but the problem...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...