Blog

June 7, 2017
Comments [0]

You may now add Miley Cyrus, Emma Watson and Amanda Seyfried to the pool of celebrities who’ve been hacked and publicly humiliated. No doubt, other high-profile individuals will follow.

It’s a reminder that “high net worth individuals,” or...

Read More
May 1, 2017
Comments [0]

International business travelers take heed: Starting now, and even more so going forward, you’ll need to carefully consider how your computing devices serve as a conduit to sensitive company data.

This includes everything stored directly on your smartphones and laptops—and everything reachable from your personal computing devices that may be stored in the internet cloud.

Electronic media...

Read More
April 27, 2017
Comments [0]

There was at time 15 years ago when we fully expected the latest, coolest software to come riddled with aggravating bugs. Consumers were trained to expect that the software vendor would fix the glitches in version 1.1 or 1.2.

Software developers today remain under more pressure than ever to rush to market with the coolest functionalities. But those that do so create fresh vulnerabilities that cyber criminals pounce on to breach business networks and cause other havoc.

Factor in...

Read More
March 31, 2017
Comments [0]

Two bold pronouncements—one in the United States and the other in the U.K.—have poured kerosene onto the flickering debate about privacy vs. the need for surveillance.

First came President Trump’s executive order, issued March 6, signaling that travelers entering the U.S.—including attorneys with cloud access to client information—could have their digital devices ...

Read More
January 25, 2017
Comments [0]

San Francisco-based Bay Dynamics bills itself as a cyber risk analytics company focused on helping large enterprises measure, communicate and reduce cyber risk. The company is a rising contender in the “threat intelligence” space.

Founded in 2001 as a security and IT consulting firm, Bay Dynamics shifted in 2006 to creating its own security products, and in 2013 launched its current flagship product offering—Risk Fabric.

I had the chance to sit down with Steven Grossman, vice-...

Read More
January 23, 2017
Comments [0]

As a partner at the Canadian law firm Borden Ladner Gervais, Éloïse Gratton advises her clients on legal, practical and ethical ways to protect an individual’s privacy while conducting business nationally and internationally. She has testified before Canada’s House of Commons and other federal bodies and conducted training workshops attended by judges and members of the Parliament.

ThirdCertainty sat down with Gratton just after she...

Read More
January 1, 2017
Comments [0]

More organizations than ever, especially small and medium-size ones, will seek to account for the fast-rising risk of suffering a cyber attack in 2017 by buying a cyber liability policy.

The general state of security of U.S. business networks remains anemic when compared to the vast and growing capabilities of hackers with malicious intent. Companies are beginning to realize the value of offsetting this risk to an insurance...

Read More
October 21, 2016
Comments [0]

SCOTTSDALE, Ariz.—Watching a larger-than-life Edward Snowden converse, in real time, with CyberScout Chief Privacy Officer Eduard Goodman at Boulders Resort here this week was a rare privilege.

Many in the audience of some 250 attendees of CyberScout’s Privacy XChange Forum 2016 shared my sense that we were witnessing history in the making. Here was a young American...

Read More
September 9, 2016
Comments [0]

Flash quiz: What tool do humans use most often for sharing, collaborating, coordinating and archiving? Answer: Email.

And precisely because consumers and companies continue to rely so heavily on email, cyber criminals relentlessly exploit email as a favorite attack vector. Thus spear phishing remains the primary way intruders initiate Advanced Persistent Threat (APT) attacks.

Related...

Read More
August 24, 2016
Comments [0]

After years of extorting individual consumers on a global scale, ransomware  purveyors have turned their attention to much bigger fish: businesses.

For years, now, ransomware extortionists have profited handsomely from locking up the computer screens of millions of consumers with scams to sell bogus $79 antivirus cleanup services.

Now fresh intelligence from consultancy Deloitte, networking...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started