| |

Explainer: Self-Sovereign Identity

People share a lot of personal information through digital channels, and the entities they interact with access more of it than they need. Individuals have little control over the transmission of their data and who gets what. The concept of a decentralized, self-sovereign identity fixes that while addressing cybersecurity and streamlining processes. A self-sovereign identity…

|

A ‘Very Credible’ Candidate: This Recruiting Scam Is Underway Now

“Victoria Jones,” head of leadership consulting at Exec Search Pros Inc., emailed yours truly on Oct. 29 about a client that had “retained us to fill various senior-level positions in one of their recent acquisitions. I was referred to you by an outside talent sourcing firm and based on your previous experience I think you…

| |

Op Ed: Will Tate And Kathy Kent On ‘True’ Global

GoldSpring Consulting’s Kathy Kent and Will Tate sketch out the foundations for going global with corporate travel management companies. Global is a frequently used term to describe a corporate travel program and its travel management company support. When you hear “global” and “TMC,” what model comes to mind? Everything from every country is the same?…

| |

Beware Free Wi-Fi: Government Urges Workers To Avoid Public Networks

By David Sanger, a White House and national security correspondent, and Julian Barnes, a national security reporter. The Biden administration would like you to get a vaccine and wear a mask. Oh, and one more thing: It has just proclaimed that it’s time for government employees and contractors to get off public Wi-Fi, where they…

|

Op Ed: Matt Blackmon On Common Information Security Vulnerabilities In Travel Management

Matt Blackmon is vice president of customer success for the Travel, Transportation & Hospitality Practice at DataArt, a global software engineering firm. Here he provides a primer on the cybersecurity issues facing those involved in handling corporate travel data. As business travel recovers, corporations will allow employees back on planes and they will reach back…

Remote Risks, Ransomware Highlight Individual Role In Stopping Attacks

Coverage of a thwarted cyberattack against carmaker Tesla last week suggested the alleged perpetrator was also involved with the July ransomware used against CWT. The travel management company reportedly paid out more than $4.5 million in Bitcoin to regain control of its computers and protect client data. While there’s no confirmation that it’s the same…

Does Your Board Really Understand Your Cyber Risks?

By Daniel Dobrygowski, head of governance and policy for the World Economic Forum Centre for Cybersecurity, and Derek Vadala, CEO of Cyber Assessments, a joint venture between credit rating agency Moody’s Corporation and company-building venture group Team8. This article is republished here with permission as part of our licensing program. Over the past decade, business leaders have…