CCPA Part III: Don't Fight the Tide

California Consumer Privacy Act: SEC.2 (h), an introductory statement giving context to the new privacy law:

READ MORE +

Protecting Intellectual Property Part II: VOKSEE Leads the Way in IP Protection

 

READ MORE +

Protecting Intellectual Property Part I: Cyber Security Makes Its Way to Hollywood

 

READ MORE +

Quick and Dirty Disaster Recovery Guide: Part III

I had the opportunity to work with one of our clients on a Disaster Recovery tabletop exercise last week.  This practice, like Business

READ MORE +

Gone Phishin’

Who hasn’t received an email from their boss telling them to get a certain task done quickly? Chances are you have, and you probably completed the

READ MORE +

SMS Verification Codes: We Need to Stop Being Basic about MFA

I am not exaggerating when I say that my life is my smartphone. I use it foreverything - to email, text, and stalk corgis on Instagram. I also use

READ MORE +

California Consumer Privacy Act (CCPA): What You Need to Know

In the first installment of our series on CCPA, Jenna Waters offered a breakdown of the coming law, and its general implications on privacy in the

READ MORE +

3 Reasons It's So Hard to Use Powerful Technology and Data Without Getting Hacked

AI, IoT Devices, Remote Healthcare Technology, Self-driving Vehicles: Why is it that we keep reading about innovative technologies that

READ MORE +

Another City Government Pays the Ransom

“Most of us are familiar with the phrase ‘security through obscurity’: the idea that my organization is small enough I can’t possibly be on the

READ MORE +

Cyber Resilience and a Dam Disaster

Over the last month, our Tulsa office has watched on as constant rain storms across the Midwest filled the nearby Arkansas River to capacity, then

READ MORE +
1 2 3 4 5