LaptrinhX
  • My
  • Tag
  • Author
  • Ebook
  • Theme
  • Tutorial
  • Funny
  • IT Job
  • Video
  • Tools
  • Hacker News

    Authors ::

    Michael R. Overly

    24 posts •


    Avoiding the pitfalls of operating a honeypot
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2019-11-25 17:26

    Avoiding the pitfalls of operating a honeypot

    So, you’ve had enough. You are fed up with hackers and have decided to go “active” in identifying and taking them down. While the sentiment is certainly justifiable in these difficult times, the old adage of...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    4 key vendor contracting pitfalls
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2019-10-17 23:45

    4 key vendor contracting pitfalls

    When it comes to information security, all too often when entering into contracts with vendors and suppliers, the entire focus is on “show us your audit reports and security policy.” Don’t get me wrong, that...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    Why every business should consider ISO 27701 compliance for their vendors
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2019-09-10 17:20

    Why every business should consider ISO 27701 compliance for their vendors

    On August 6, 2019, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) released ISO/IEC 27701 (ISO 27701), a privacy extension to ISO/IEC 27001 and ISO/IEC...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    Business email compromise:  The odds of being a victim are increasing
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2019-07-19 16:08

    Business email compromise: The odds of being a victim are increasing

    As is often the case, guidances or advisories issued by regulators in the financial services industry are frequently highly useful for all forms of businesses, whether financial services or otherwise.The most recent...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2019-04-18 17:33

    Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

    On April 4, 2019, California Assembly Member Wicks proposed sweeping changes to bill AB 1760, effectively repealing the California Consumer Privacy Act of 2018 (CCPA) and replacing it with the Privacy for All Act of...

    Michael R. Overly
    M Michael R. Overly
    7 min read
    A hacker or your cloud provider. Who presents the greatest risk to your data?
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2019-04-03 22:48

    A hacker or your cloud provider. Who presents the greatest risk to your data?

    It’s your worst nightmare. All of your most important and sensitive data, the thing your business values most, the thing your company cannot operate without, the thing your regulators require you to protect, has been...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    Can owning your company’s encryption lead to better security?
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2019-02-04 16:25

    Can owning your company’s encryption lead to better security?

    I previously wrote several posts about the somewhat dire state of the world with regard to information security in vendor and supplier relationships. In particular, I noted the growing trend by vendors to decline...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    The end of security as we know it
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-11-14 19:23

    The end of security as we know it

    If you listen very carefully, the age of information security as we know it ended recently, not with a bang, but with a whimper.  While that may be something of an overstatement, a recent event put us on the track to...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    Reconciling information security and shrink-wrap agreements
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-09-21 17:00

    Reconciling information security and shrink-wrap agreements

    There is simply no avoiding it. Every business, regardless of size or type, has entered into “shrink-wrap” or “click-wrap” agreements (i.e., non-negotiable agreements provided with various types of software and...

    Michael R. Overly
    M Michael R. Overly
    5 min read
    Is California’s Consumer Privacy Act of 2018 going to be GDPR version 2?
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-08-01 16:15

    Is California’s Consumer Privacy Act of 2018 going to be GDPR version 2?

    While there is time before the California Consumer Privacy Act of 2018 comes into effect, which is January 1, 2020, businesses need to start planning now for compliance. The CCPA provides California consumers with...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    Integrating information security into the technology development process
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-06-29 20:30

    Integrating information security into the technology development process

    In a recent blog post, I discussed limitation of liability clauses in technology contracts.  Given the favorable response to that post, I thought it would be of interest to discuss another misunderstood and frequently...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    Do those stellar security obligations really provide any protection?
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-05-30 22:12

    Do those stellar security obligations really provide any protection?

    In this blog entry, we are going to be talking about a dirty word:  liability.  Specifically, we are going to be looking at vendor liability in the event of a security/data breach on their systems and networks. ...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    Doing security policies right
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-04-25 19:16

    Doing security policies right

    Most sophisticated businesses have at least some form of a security policy for their organizations.  Unfortunately, all too often, those policies are inadequate, fail to comply with applicable regulatory requirements,...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    Think of 'insiders' when drafting and implementing security policies
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-03-30 00:17

    Think of 'insiders' when drafting and implementing security policies

    To build upon my previous articles about security threats posed by vendors, today we focus on a very specific and frequently overlooked element of vendor risk mitigation: vendor personnel working within customer...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    How to avoid security assessment cost overruns
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-03-01 18:31

    How to avoid security assessment cost overruns

    Engaging a third-party assessment expert in conducting a review of a business’ security measures is a cornerstone of good security practice.  Among other things, assessments can identify hidden vulnerabilities in a...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    A checklist for avoiding cyberattacks with vendors’ tech products
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2018-01-31 00:44

    A checklist for avoiding cyberattacks with vendors’ tech products

    The technology environment in almost every business is composed of an amalgamation of dozens, if not hundreds, of technology products.  These products may be traditional software packages, open source software,...

    Michael R. Overly
    M Michael R. Overly
    2 min read
    6 resolutions for a secure new year
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2017-12-14 20:00

    6 resolutions for a secure new year

    It’s that time of year again.  As 2017 comes rapidly to an end, businesses should be considering potential resolutions for improving their security practices in the coming year.  Here are six action items that have...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    Employee training remains the best first line of defense against cybersecurity breaches
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2017-11-21 23:04

    Employee training remains the best first line of defense against cybersecurity breaches

    If there is one lesson to be learned from the recent mass spate of security breaches, particularly those involving ransomware, it is this: adequate training for personnel can dramatically decrease the likelihood of a...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    6 tips for drafting better statements of work
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2017-09-25 19:08

    6 tips for drafting better statements of work

    You can draft the best, most protective contract in the world, but if the statement of work (“SOW”) fails to adequately describe the deliverables and the services to be rendered, projects can fail, cost can overrun...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    What can my cloud provider do with my data?
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2017-08-29 18:14

    What can my cloud provider do with my data?

    Take a moment from your day and pull out the last three or four cloud services agreements your company has entered into. Now, highlight the provisions in those agreements that specifically define how the vendor may use...

    Michael R. Overly
    M Michael R. Overly
    2 min read
    Know the 'real' price of vendor contracts
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2017-07-20 18:14

    Know the 'real' price of vendor contracts

    The age of predatory vendors is upon us. Businesses that fail to take the old Latin adage caveat emptor (“let the buyer beware”) seriously do so to their extreme peril. Even though many vendor engagements result in...

    Michael R. Overly
    M Michael R. Overly
    4 min read
    Despite the warnings, corporate cyber defenses remain inadequate
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2017-06-21 18:21

    Despite the warnings, corporate cyber defenses remain inadequate

    If anything, 2017 will be remembered as the year of the cyber-attack. No business is safe. No industry is exempt. The ease with which cyber-attacks can be launched and virally propagated was brought home recently by the...

    Michael R. Overly
    M Michael R. Overly
    2 min read
    Cloud solutions: The danger of 'floating' contracts
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2017-05-25 20:24

    Cloud solutions: The danger of 'floating' contracts

    In most cloud engagements these days, it is not only the customer’s data that is in the cloud, but also many key parts of the vendor contract as well.  That is, the average cloud vendor today generally places several...

    Michael R. Overly
    M Michael R. Overly
    3 min read
    Big Data: A Business and Legal Guide
    • twitter
    • facebook
    • email
    ebooks 2014-09-25 08:15

    Big Data: A Business and Legal Guide

    Title: Big Data: A Business and Legal Guide Author: James R. Kalyvas, Michael R. Overly Length: 240 pages Edition: 1 Language: English Publisher: Auerbach Publications Publication...

    • James R. Kalyvas
      J
    • Michael R. Overly
      M
    2 min read
    LaptrinhX © 2021
    Latest Posts bdev.dev raoxyz congtyaz