Blog

To locate a specific post or topic, simply use the search box on the upper right next to the magnifying glass icon

  • B0r0nt0K Ransomware Threatens Linux Servers

    B0r0nt0K Ransomware Threatens Linux Servers

    A new cryptovirus called "B0r0nt0K" has been putting Linux and possibly Windows Web servers at risk of encrypting all of the infected domain's files.

    Read Article
  • ×



    Subscribe now
    to receive content updates once a week

    First Name
    !
    Success
    Error - something went wrong!
  • The 11 Biggest Issues IT Faces Today

    The 11 Biggest Issues IT Faces Today

    From securing IoT to retraining IT talent to finding new revenue streams, CIOs have more than their share of concerns keeping them up at night. Each year we talk with tech leaders...

    Read Article
  • New Privacy Obligations from CaCPA’s Proposed Amendments

    New Privacy Obligations from CaCPA’s Proposed Amendments

    For those not tracking the evolution of California’s Consumer Privacy Act (CaCPA), we’ve got some updates for you!  While most are just familiarizing themselves with CaCPA’s original...

    Read Article
  • Stop, Celebrate, and Listen - International Women's Day 2019

    Stop, Celebrate, and Listen - International Women's Day 2019

    Within the past few months, I was fortunate enough to represent Schellman & Company at various women’s leadership conferences.  These events were industry-specific, with one being...

    Read Article
  • 6 Hot IT Leadership Trends — and 6 Going Cold

    6 Hot IT Leadership Trends — and 6 Going Cold

    As the CIO role becomes increasingly strategic, risk aversion and a results-oriented mindset take a backseat to increasingly influence and driving organizational change.

    Read Article
  • Supply Chain Software Poses Security Risks

    Supply Chain Software Poses Security Risks

    Poor internal security procedures and a lack of compliance protocols -- especially for small suppliers -- can introduce cybersecurity threats into global supply chains.

    Read Article
  • Why you need a digital forensics team (and the skills to look for)

    Why you need a digital forensics team (and the skills to look for)

    Prevention and detection aren't enough. To better defend against future intrusions, you need a strong digital forensics team that can analyze attacks. In a world where enterprises are...

    Read Article
  • Tips for Preventing Supply Chain Attacks

    Tips for Preventing Supply Chain Attacks

    Defining your company's security requirements and having a cyber-risk management program to evaluate third-party services can reduce the risk of attacks on supply chain software....

    Read Article
  • Schellman’s Response to the EDPB Comments

    Schellman’s Response to the EDPB Comments

    Comments by Schellman & Company, LLC on the European Data Protection Board’s Annex 1 of the “Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the...

    Read Article
  • If You’re Not First, You’re Last - Risks of Delaying CaCPA Compliance

    If You’re Not First, You’re Last - Risks of Delaying CaCPA Compliance

    Overview of CaCPA Privacy continues to span headlines with endless coverage of personal data misuse scandals by household-name companies, highlighting their unethical data management...

    Read Article
  • Phishing: Think like a cybercrook

    Phishing: Think like a cybercrook

    Phishing still steamrolls organizations Phishing attacks rely on a single moment of inattention or ignorance. Follow a link and the results are front-page news. A strategy for...

    Read Article
  • Supply and Demand (for security)

    Supply and Demand (for security)

    2018 was the year that raised the alarm in earnest about potential vulnerabilities in the supply chain for enterprise computing systems.But with such diverse networks and widespread...

    Read Article
  • Microsoft Supplier Security and Privacy Assurance (SSPA) Program Attestation

    Microsoft Supplier Security and Privacy Assurance (SSPA) Program Attestation

    If your organization is a current or aspiring Microsoft vendor, you’re probably familiar with the Microsoft Supplier Security and Privacy Assurance Program (SSPA) program (previously...

    Read Article
  • Full Sail Ahead: Navigating PCI Compliance on Kubernetes - Part 1, Networking

    Full Sail Ahead: Navigating PCI Compliance on Kubernetes - Part 1, Networking

    Introduction Welcome! In the upcoming series of articles (this is Part 1), I’ll be discussing some things to consider if you want to use Kubernetes to host an application that is...

    Read Article
  • Cloudy With a Chance of Automation

    Cloudy With a Chance of Automation

    Securing the  cloud requires a  different mindset  than securing your on-prem  infrastructure Adventures in securing the cloud As cloud operations become increasingly popular,...

    Read Article
  • A Major or Minor Change? What’s new with ISO 27018:2019

    A Major or Minor Change? What’s new with ISO 27018:2019

    The International Organization for Standardization (ISO) has released a second edition to ISO 27018, its guidance for cloud service providers who process personally identifiable...

    Read Article
  • Free Privacy Tools for Individuals and Organizations

    Free Privacy Tools for Individuals and Organizations

    Happy Data Privacy Day! Every January 28th, the United States joins Canada, India, and 47 European countries in raising awareness for data protection and the privacy of individuals’...

    Read Article
  • SOC it to Cybersecurity

    SOC it to Cybersecurity

    The fight against cyber threats is one that requires much more preparation that it may have in the past. Today, threats and attacks are disrupting business operations and unnerving...

    Read Article
  • Vendor Management – Ignorance is Not Bliss

    Vendor Management – Ignorance is Not Bliss

    As technologies continue to advance, corporations will consistently evaluate whether responsibilities should be managed internally or outsourced to a qualified vendor.  Whatever the...

    Read Article
  • What Will the Biggest Cybersecurity Risk Be in 2019?

    What Will the Biggest Cybersecurity Risk Be in 2019?

    The cybersecurity risk landscape is constantly evolving, and regulations like GDPR are making it even more crucial for organizations to protect their customers' and users' privacy. By...

    Read Article
  • loading
    Loading More...