Cybersecurity Blog

What is Encryption Key Management, and What Factors Should be Considered when Implementing a KMS Solution?
What is Encryption Key Management, and What Factors Should be Considered when Implementing a KMS Solution?

To provide effective data protection and application defense and remain in compliance, organizations today need to protect their most critical data as it is created, transmitted, and stored. This requires companies to successfully encrypt this data, a process that raises its own challenges related to encryption key management and effectively implementing a key management server…

Read More

Why the Wendy’s Data Breach Settlement may be the Worst One Yet… And how the FTC may be Expanding its Breach Governance Approach
Why the Wendy’s Data Breach Settlement may be the Worst One Yet… And how the FTC may be Expanding its Breach Governance Approach

In September 2018, Wendy’s settled class-action lawsuits brought by financial institutions and customers whose personal information was compromised by a data breach that impacted 1,000+ of the restaurant chain’s locations. The settlements totaled over $50M, surpassing the payments resulting from the Target and Home Depot breaches. Since federal Investigators were involved to understand the reasoning…

Read More

Learn About Our Approach for Industrial IoT Cyber Protection!
Learn More