When it comes to cloud computing, contract terminations can occur for a number of reasons. Due diligence requires companies to lay out an exit plan for what happens if a cloud provider does not work out as expected. When a cloud vendor relationship eventually ends — and they always do…
Read More
At some point, you’ve likely seen markings and icons on an electronic device, its user manual or the box it came in. If you’re unsure what these markings are, they are almost certainly some type of certification. Some time ago, we started testing goods for safety before they hit the…
Read More
The financial services industry (FSI) is a complex ecosystem in which each entity has dependencies on others around it. In this highly interconnected sector, an attack on one part of the ecosystem can result in collateral damage and detrimental implications for other organizations across the sector. With that risk profile…
Read More
Passwords are a problem, and relying on them for user authentication is problematic. This has been an accepted truth in the infosec community for some time, yet credential-based methods are still ubiquitous. The average person now has dozens of personal and business username/password combinations to keep track of and recycles…
Read More