Stephen Lawton

Stephen Lawton

Most Recent Articles by Stephen Lawton

How to hire a chief privacy officer

Do not be misled — the CPO is not just another position where you give someone a job title and hope they grow into the position. The responsibilities are varied, highly focused, and carry with them some rather unusual job peculiarities.

Is your perimeter secure?

Protecting your network from the vast array of mobile devices can be challenging. In the end, it's all about identity and access management.

5 Questions to ask cloud services providers about security

Ask prospective cloud servers these five questions germane to security.

Top 6 steps for GDPR compliance

Here are the Top 6 steps you need to take in order to become GDPR compliant.

10 Ways to tell if that email is legitimate...or not

More sophisticated spear-phishing and whaling attacks — attacks that focus on specific individuals — take more time to prepare and research, but they too can be very inexpensive to perform.