Digital ID Proofing: Testing…Now Complete

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Digital ID Proofing: Testing...Now Complete

Digital Identity (ID) Proofing—also known as digital identity authentication or digital ID verification using computer technology—is an increasingly important aspect of online security.  Even if you’re doing business only online, you still need to be sure that your customers are who they say they are and that the information you collect about them is accurate.  … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more

Network Integrity

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

Cloud connecting to people in tech circles, network integrity

Network integrity starts with a network diagram. Actually, most things regarding technology risk should start with a network diagram. Your network is the circulatory, nervous and endocrine systems of your company. As such, it…