Incident Response

Data Breach Laws: A State-by-State Framework

What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular...

The Enlightening

Kicking Off a Next Generation Incident Response Test Awareness, for TechsAnother one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . ...

Mutiny! The Malicious Insider Threat Webinar Registration

Mutiny! The Malicious Insider Threat Webinar Registration A Webinar-Video It is often awkward to bring up the one attack vector most of us have not addressed. The malicious insider threat. Even if we can flaunt all statistics and claim that the likelihood of an insider at...

From a Napkin to the Future!

Questions from a decade ago . . . That rhyme! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So this article starts in my bedroom; cleaning out my closet. I finally decide that yes, I’m will never grow back into th...

The Four Basic Truths of System Security

System Security and Cybersecurity are not the same thing. . . Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Regarding “information security,” the last thirty years have seen an evolution of frameworks, laws, and ...

What to Expect from an infotex Incident Response Tabletop Test Movie

A Webinar Movie This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!

Data Breach Laws: A State-by-State Framework as of September 2022

What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evo...

The Changing IT Landscape and Endpoint Detection and Response (EDR)

Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many convenience...

Managing Software Supply Chain Risk

Software Bill of Materials (SBOMs) are becoming more and more important. . . We are all very familiar with one aspect of the software supply chain – updates.  New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycl...

Pandemic Woes Add To The Cybersecurity Job Retention Struggle

According to a new survey, more organizations than ever are reporting problems with cybersecurity staffing… An article review. While pandemic related mandates and restrictions are gradually being lifted across the country, many organizations are still feeling the...