212-256-9890

Does Your Cybersecurity Plan Need A Backup Plan To Survive?

 -

If you are a business professional, you know that data plays a huge role in so many of your job functions. No matter what industry you are in, data is important. “Every business enterprise using information technology and benefiting from the networking power of the internet, regardless of industry...

Read more
20 Sep, 2017

Could E-Waste Cause Cyber Security Concerns?

 -

Do you remember what your computer looked like in 2001? If your answer is yes, could you access it right now? The answer is probably no because that computer ended up being e-waste in a landfill, with hundreds of other old electronics. When it comes to enterprises, those discarded...

Read more

What Is The Biggest Cybersecurity Threat To The Finance Industry?

 -

In a report done by IBM last year, financial services were said to be the number one targeted industry for cyber threats, since they store sensitive data and manage money. Because of this, financial institutions have amped up security and have looked into the root cause of data breaches....

Read more
19 May, 2017

News Round-up: Wal-Mart vs. Amazon, Healthcare Victim of Cyber attack, New Presidential Order and more

 -

This week’s news round-up looks at the ongoing battle between Wal-Mart vs. Amazon, UK hospitals falling victim to cyber attack, the subsequent new Presidential Order and more. There’s been a lot happening this week, especially in Retail so that’s where we’re going to start. RETAIL Wal-Mart vs. Amazon The...

Read more

The WannaCry Ransomware, a Wake-Up Call for Marketers

 -cybersecurity and marketing

Late last week, the WannaCry ransomware, computer malware, spread across 150 countries with hundreds of thousands of computers being affected. The ransomware took over users’ files demanding $300 (£230) to restore access. Computer giant Microsoft said the attack should serve as a wake-up call for businesses all over the world....

Read more
31 Mar, 2017

News round-up: Distil uncovers Malbot, Domino’s Robot Delivery, Google Boycott, Lyft provides nonemergency patient transport, Brexit and more

 -digital news blog march 31

Here’s is our latest digital transformation news round-up. MARKETING Google Google’s issues are deepening this week as more companies join the growing boycott of its ad services. Candy giant Nestle is the latest to choose to drop their google adverts. In a move to prevent more companies boycotting, Google...

Read more
07 Sep, 2016

Jack Barsky Former Undercover KGB Agent Headlines 2016 Digital Enterprise and Transformational CISO Assembly!

Jack Barsky Former Undercover KGB Agent Headlines 2016 Digital Enterprise and Transformational CISO Assembly! NEW YORK, September 7th, 2016 – The Millennium Alliance is incredibly honored to have Jack Barsky, Retired CIO of NRG Energy and Former Undercover KGB Agent, as the gala dinner keynote speaker at our upcoming Digital Enterprise Transformation...

Read more
29 Jun, 2016

Beyond Illegal Orders: Concern About a Misuse of Executive Power

During this unusual political season, I hear a recurring question from former, present, and aspiring intelligence officers.  It’s a question that I have rarely heard before, no matter the Administration or political persuasion of my interlocutors: “What do we do if we are given an illegal order?”  This has...

Read more
09 Feb, 2016

CYBER SECURITY HEALTH CHECK

CYBER SECURITY HEALTH CHECK When you see your doctor for a medical checkup, the results are kind of predictable, and not very actionable – lose weight, get more exercise, and avoid stress. A cyber security health check can be much more insightful and actionable, and I recommend that your...

Read more
09 Feb, 2016

10 Tips To Help You Defend And Protect Your Business From ID Theft

10 Tips To Help You Defend And Protect Your Business From ID Theft Information to keep your business safe. With 2016 upon us, you’re likely reflecting on your business triumphs, challenges, and opportunities over the past year and planning ahead. While doing so, make sure to include cybersecurity best-practice...

Read more
Show Buttons
Share On Facebook
Share On Twitter
Share On Linkedin
Hide Buttons