Boldon James Logo

Enterprises Must Take Insider Threats More Seriously

Reading Time: 4 minutes Security teams need to consider the possibility of internal as well as external threats While high-profile cybersecurity breaches originating from malicious insiders are on the rise, many cybersecurity professionals continue to focus exclusively on external threats, forgetting that a… Read More

What is SOX Compliance? 2019 SOX Requirements & More

Reading Time: 3 minutes A definition of SOX Compliance In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures. The act… Read More

How Can CISOs Improve Board Governance Around Cyber Risk Management?

Reading Time: 4 minutes The pressure is on for corporate leadership to get a better handle on cybersecurity. But unlike other board governance processes that are a lot more mature (e.g., financial risks, market pressures), when it comes to cyber risks, boards need help… Read More

CUI (NIST 800-171) is getting some teeth!

Reading Time: 2 minutes On December 17th 2018 a memorandum from the Assistant Secretary of Defense was released entitled “Strengthening Contract Requirements Language for Cybersecurity in the Defense Industrial Base” that reminds acquisition personnel that it “is critical that efforts to identify, track,… Read More

Almost 60,000 Post-GDPR Data Breaches Reported In Europe

Reading Time: 2 minutes Research published recently suggests there have been over 59,000 data breaches reported to data protection authorities in Europe since GDPR went into effect last year. The EU’s General Data Protection Regulation hasn’t even been in effect for a year… Read More