Boldon James Logo

Time to comply with NYDFS Phase Three

Reading Time: 2 minutes Following on from Labor Day in the United States, compliance with the third of four distinct New York Department of Financial Services (NYDFS) Cybersecurity regulation (23 NYCRR 500) phases have come into effect. The regulation is intended to reduce… Read More

Don’t Undermine Data Security Investments by Dismissing Data Governance

Reading Time: 3 minutes The current state of data privacy is grim and consumers don’t believe that anyone is doing enough to protect their data. The constant deluge of data privacy mishaps from giants like Facebook and Cambridge Analytica, and the major Equifax… Read More

The 5 W’s of Data Identification and Inventory

Reading Time: 2 minutes Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in… Read More

Tesla Data Theft Case Illustrates the Danger of the Insider Threat

Reading Time: 3 minutes Tesla filed a lawsuit against a former employee this week after it learned he made changes to company source code and exported gigabytes of proprietary data to unknown third parties. Tesla CEO and business magnate Elon Musk learned a… Read More

What are the different types of cyberthreat intelligence?

Reading Time: 6 minutes Cyberthreat intelligence: It’s a growing business (and buzzword) that provides many market opportunities. Consuming threat intelligence data is valuable for organizations to improve their security posture and strengthen their protection, detection and response capabilities. But there are some sharks… Read More