Category: Blog

Blog

5 Reasons Private Companies Should Start on ASC 84…

When the Financial Accounting Standards Board (FASB) officially delayed the effective date for the ASC 842 lease accounting standard until January 2021, many private companies breathed a sigh of relief. After having to adopt the new revenue standard ASC 606 last year, implementing another major accounting standard imme…
Blog

The 5 Most In-Demand Cybersecurity Jobs for 2020

Updated: December 10, 2019 In 2019, businesses invested even more in technology, new privacy regulations were passed, and cyber threats became more sophisticated. To meet the growing demands of today’s businesses, (ISC)2 estimates that the U.S. cybersecurity workforce would need to increase by 62%. With cybersecurity…
Blog

The Impact of the CCPA’s Do Not Sell Rule on…

Does your technology know you better than some of your closest friends? Much of the technology you rely on tracks your search history, analyzes your social media posts and comments, monitors your purchases, and studies every aspect of your digital life without you even knowing. It feels like an episode of Black Mirror,…
Blog

The Equifax Settlement and Increasing Standards of…

In September of 2017, Equifax, the largest of the three main credit reporting agencies, announced a data breach that exposed the personal information of 147 million consumers – almost 50% of the U.S. population. Due to a known, unpatched security vulnerability, hackers were able to gain access to a magnitude of unenc…
Blog

Data Protection in Thailand: A Summary of the PDPA

After several legislative attempts, the Thailand Personal Data Protection Act (PDPA) was finally approved by the Thai National Legislative Assembly in February 2019. Following the passage of the bill, the PDPA was published in the Royal Thai Government Gazette and came into effect on May 28, 2019. Companies now have on…
Blog

HPE’s Deputy CISO Discusses Cyber Workforce …

This is the first episode in Focal Point's Practitioner Interview Series, in which Focal Point experts sit down with real-world security leaders to discuss strategies for overcoming common security challenges. Drew Simonis, Deputy CISO of Hewlett Packard Enterprise, graciously sat down with Focal Point's Justin Avery t…
Blog

Tips for Improving Data Privacy Conversations in t…

When you add up business disruptions, productivity and revenue losses, settlements, fines, and penalties, the average cost to a company not compliant with data protection, state, federal, international, or industry regulations is around $15 million. With a skyrocketing number of new data protection laws (e.g., the CCPA…
Blog

How to Build Obfuscated Macros for your Next Socia…

Attention, pen testers: Are you looking to run a phishing campaign that puts your antivirus software to the test? Then this post is for you. In this post, I will guide you through how to build a malicious obfuscated macro in a Word document. I know you may be thinking that there are plenty of tools that generate Visual…
Blog

How to Build a Cheap Active Directory Pen Test Lab…

The Problem Whether you're brand new to penetration testing or have some experience under your belt, you want to have a safe environment where you can learn and practice the use, exploitation, and remediation of vulnerable software and unsafe configurations without exposing yourself or your clients' systems and network…