Blog Series: U.S. Privacy Regulations  - The CONSENT Act

Blog Series: U.S. Privacy Regulations  - The CONSENT Act

Recent revelations about Facebook’s data privacy practices and Cambridge Analytica’s potentially nefarious use of Facebook data has a reactive.


What is SIEM or Continuous Security Monitoring (CSM)?

What is SIEM or Continuous Security Monitoring (CSM)?

With the cyber-security threat landscape constantly evolving and developing new styles of attacks it is no longer enough to simply trust.


VPNFilter Malware Infection

VPNFilter Malware Infection

Summary

 On Friday, May 27th, the FBI released an announcement stating that “Foreign cyber actors have compromised hundreds of thousands of home.


ATS Employee Feature - Bill R.

ATS Employee Feature - Bill R.

Every month, ATS will share the talent and hard work that we call our team. From help-desk and NOC, to consulting, sales, application.


GDPR – 4 Things Associations and Nonprofits Can Learn

GDPR – 4 Things Associations and Nonprofits Can Learn

On the eve of one of the most comprehensive personal data privacy regulations going into effect on May 25th, it is a good time to ponder what any.


Vulnerability Assessment and Penetration Test (VAPT): How They Can Help You Comply with Multiple Regulations and Standards

Vulnerability Assessment and Penetration Test (VAPT): How They Can Help You Comply with Multiple Regulations and Standards

Raise your hand if you have ever heard of either the Payment Card Industry (PCI) Data Security Standard (DSS), the National Institute for.


ATS Employee Feature - Chris S.

ATS Employee Feature - Chris S.

Every month, ATS will share the talent and hard work that we call our team. From help-desk and NOC, to consulting, sales, application development,.


GDPR Enforcement is Right Around the Corner. It's Not Too Late To Prepare.

GDPR Enforcement is Right Around the Corner. It's Not Too Late To Prepare.

GDPR is already in effect and will be officially enforced on May 25, 2018. Is your organization prepared for this new regulation?The EU Global.


Cybersecurity and IT Terms Everyone Should Know, A to D

Cybersecurity and IT Terms Everyone Should Know, A to D

It’s the responsibility of every nonprofit or association employee to have at least a basic understanding of cybersecurity terms and best.


5 Types of Social Engineering Scams to Know

5 Types of Social Engineering Scams to Know

so·cial en·gi·neer·ing

sōSHəl ˌenjəˈni(ə)riNG

(in the context of information security) the use of deception to manipu late individuals into.