Warning: Creating default object from empty value in /homepages/9/d783455652/htdocs/app784510987/wp-content/themes/salient/nectar/redux-framework/ReduxCore/inc/class.redux_filesystem.php on line 29 Insights – Grey Market Labs PBC
Private, federal, and state investigators are increasing their online presence because more of their work is going online. For the most part, investigators are not trained in cybersecurity practices. So,…
The concept of privacy is multifaceted and complex, a concept that has evolved over time with emerging technologies, across societies and cultures, and redefined as new domains are discovered and…
The use of encryption on the internet has grown tremendously over the past decade; HTTPS has quickly shifted from a technology used primarily to protect e-commerce, to an industry standard…
It’s 10PM and you’re ending your day but hackers are just getting started. Maybe a cup of brute-force strength hacking techniques to start their day? Before you drift to sleep,…
CREXi and CoStar Group both sell real estate information to help customers follow trends and more accurately value properties. Having the right information when buying or selling a commercial property…
Do you control YOUR data and how exactly do you “control” it?
Privacy legislation has been on the horizon for almost as long as security legislation. Every year, digital tracking techniques get better (or creepier, depending on your perspective). What if all…
Grey Market Labs® and Virtru Partner to Deliver Secure Analytics
Even with technological advancements in data processing, machine learning, and other analytics, organizations face challenges when sharing valuable data with collaborators due to a lack of transparency and ownership of…
The Challenge of In-House Data Protection and Privacy
If you are a mid-size or larger business, you have an overworked security team. Those teams have responsibility across dozens of business areas, from executive protections, to cyber defense, to…
Security Considerations for Enterprise Remote Access
Remote-access technologies are top-of-mind for most IT professionals now, and remote work is a trend which is likely here to stay for the long term. If you’re looking to update…
The Risks with Increased Use of Virtual Environments
On Wednesday, the FBI released a PSA (I-040120-PSA) on threats associated with the increased use of virtual environments (https://www.ic3.gov/media/2020/200401.aspx). With the massive increase in remote and telework, the attack surface…
Have you ever used a "private" browsing window before? You might know it as "Incognito Mode" in Chrome, “InPrivate” in Edge, or “Private Browsing Mode” in Safari & Firefox. These…
DNS ad-based tracking gets a boost On 11/22/2019, the co-founder of NextDNS posted an article (https://medium.com/nextdns/cname-cloaking-the-dangerous-disguise-of-third-party-trackers-195205dc522a) addressing 3rd-party tracking capabilities with DNS. If you haven't read it yet, it's worth…
Cyber Liability Insurance: Part of a comprehensive security plan
It seems like every day there is a new story about a data breach and how millions of sensitive user records have been exposed. The financial and healthcare industries are…
Is your VPN doing everything it promises to protect your privacy?
Commercial VPN services have recently gained widespread popularity and many present themselves as a solution for online privacy. Some of them even claim to enable anonymous internet browsing. However, as…
Permanent Impressions – how what you do online defines you forever
Imagine strolling through the mall, visiting several stores, trying on some clothes, and reading a magazine that you picked up at Barnes & Noble while you sip your coffee from…
Ginny!" said Mr. Weasley, flabbergasted. "Haven't I taught you anything? What have I always told you? Never trust anything that can think for itself if you can't see where it…