Our Thoughts On

Sort by

Categories
Authors

Sean Thomas

Articles 1 - 5 of 5

Where Cybersecurity and Fiduciary Responsibility Meet

It’s rare to go a day without seeing a headline about a data breach, fraud, ID theft, or some other cybersecurity issue occurring. It’s a constant

Your Cyber Program is only as Strong as Your Weakest Link - Including Your Vendors

While independent studies have repeatedly shown roughly three out of five reported data breaches stem from a third-party relationship, the simple fact

Is Your Chip Card Implementation Secure?

As payment technology around the world continues to change, one consideration at the back of everyone’s mind is payment security. Whether you are
Cybersecurity
Sean Thomas | 10.11.2019

Vulnerability Scanning versus Penetration Testing

When organizations look to assess the resiliency of their information systems, there tends to be some confusion around what exactly vulnerability scanning

Register to receive our weekly newsletter with our most recent columns and insights.

Ransomware Still a Growing Problem for Organizations of All Sizes

While the concept of malware-based extortion has remained relatively unchanged since the first documented occurrence in 1989, attackers have spent the

Register to receive our weekly newsletter with our most recent columns and insights.