
Update on CFAA – SCW #61
We welcome our resident legal expert and co-host Priya Chaudry to catch us up on the status of the Supreme Court case concerning the Computer Fraud and Abuse Act (CFAA) and some other legal topics.
I
Stay in the loop on the latest cyber security news with the Red Lion Blog. Tune in for weekly updates on recent information security and compliance developments, best practices, and insights from some of the top minds in the information security industry.
We welcome our resident legal expert and co-host Priya Chaudry to catch us up on the status of the Supreme Court case concerning the Computer Fraud and Abuse Act (CFAA) and some other legal topics.
Securing an organization means more than just spending money. For those that fall below the “security poverty line,” many other dynamics come into play that make it harder for them to accomplish even the basics. How do we help them rather than scolding them?
Securing an organization means more than just spending money. For those that fall below the “security poverty line,” many other dynamics come into play that make it harder for them to accomplish even the basics. How do we help them rather than scolding them?
Mitigating insider threats is a key cybersecurity priority for any organization that works with sensitive data. And to do that, you need an insider threat program. Such a program not only is required by numerous cybersecurity regulations, standards, and laws but also allows a company to detect an insider threat at its early stages, respond to it, and remediate the damage with little to no harm done.
This segment is sponsored by Ekran System.
The conversation continues on mitigating insider threats and building an insider threat program!
This segment is sponsored by Ekran System.