Don’t Let Third Parties Bring You Down

Without an effective vendor management program, the threat looms large. How can a business effectively manage the oversight of its third-party vendors’ security and privacy programs? After all, these are completely independent and sometimes large organizations, running their own businesses and executing their own practices. It may sound overwhelming (perhaps even impossible), but it is…

What Everyone (Yes, Everyone!) Needs to Know about the Newly Discovered Wi-Fi Weakness

When the world learned of the WPA2 Wi-Fi vulnerability, some shrugged it off as “just another security flaw.” Here’s why ignoring this one is a big mistake. Wi-Fi Protected Access 2 (WPA2) is the current industry standard. That’s right, the standard. In other words, it’s everywhere. WPA2 networks, in fact, are what most of our…