LevelBlue Blog
Tag: Pii
Defending the client-side attack surface
May 14, 2021 | Mike Klepper
It is strange to think that not that long ago the Internet was a very different place. A place filled with static text content, marked up in HTML, and served up alongside a few included image files; mostly consumed by a small population of persons with specific interests. Today’s Internet consumer demands a vibrant and responsive… Read more →
Data security governance explained
May 4, 2020 | Carisa Brockman
Security, privacy, and risk does not have to be scary… but with GDPR, CCPA, and organizations moving to a risk-based approach to security rather than focusing on only compliance, it has become a daunting challenge. What is typically at the heart of organizations? Data and information. The common denominator that makes security, privacy and risk more… Read more →
Understanding cyber attacker motivations to best apply controls
February 19, 2020 | Chris Mark
Implementing a risk based security program and appropriate controls against adaptive cyber threat actors can be a complex task for many organizations. With an understanding of the basic motivations that drive cyber-attacks organizations can better identify where their own assets may be at risk and thereby more efficiently and effectively address identified risks. This article will discuss the Rational… Read more →
A new twist on “Parental consent”
January 31, 2020 | Bob Covello
An independent guest blogger wrote this blog. I was at breakfast the other day with some family friends, and the topic of genealogy came up. Over the past few years, various sites have sprouted up that offer to trace your origins all the way back in time; in some cases, all the way back to the eras of early… Read more →
What you need to know about PII security
January 17, 2020 | Bindu Sundaresan
As a society we have always relied on personal identifiers, commonly known as personally identifiable information (PII). Defining and protecting PII has recently become much more important as a component of personal privacy now that advances in computing and communications technology, including the internet, have made it easier to collect and process vast amounts of information. The protection of… Read more →