What is Pretexting? Types, Examples, & Prevention
Pretexting attacks come in all kinds of shapes and sizes. Read this blog to familiarize yourself with pretexting and how you can help your employees from falling victim to a pretexting attack.
Friday Five: Malicious AI Campaigns, the Pentagon’s 2023 Cyber Strategy, & More
In the midst of the DHS and Pentagon releasing their Threat Assessment Report and unclassified Cyber Strategy, respectively, three major social media giants came under fire this past week. Catch up on all of these stories in this week’s Friday Five!
Friday Five: A Win for Data Privacy, Conti Members Sanctioned, & More
Wins against cybercrime and the invasion of data privacy took the headlines this past week, but phishing, business email compromise, and the effects of climate change remain as threats against organizations. Catch up on all these stories in this week’s Friday Five!
What is the CCPA and What’s Needed for Compliance?
You've heard of the CCPA but what are the costs of noncompliance? We answer those questions and look at how organizations can use a DLP solution to help facilitate CCPA compliance in this blog.
Friday Five: The U.S. Operation Against QakBot, Cybercrime Treaty and Water Infrastructure Concerns, & More
The operation against QakBot marks a cybersecurity win for the U.S., but concerns over critical infrastructure, data privacy, and cyber insurance largely overshadow it. Catch up on these stories and more in this week’s Friday Five.
Friday Five: Vulnerability Disclosure, Malicious QR Codes, Social Media Giants Challenged, & More
Between malicious QR codes, ransomware, and new legislation that would require increased vulnerability disclosures, organizations have a lot to pay attention to in this week's headlines. Catch up on it all in this week’s Friday Five!
Securing Your Data, For Now and Forever
In this blog, we ask six data protection experts how modern organizations can protect their data now and in the future.
Navigating the Australian Privacy Act 1988: Implications and Preparedness for Organizations
The Australian Privacy Act 1988 has been a cornerstone in protecting Australians’ privacy rights and governing how personal information is collected, used, and managed by organizations. Here you’ll find more about what the Privacy Act is and how it could impact you or your organization.
Friday Five: Cloud Security Concerns, LinkedIn Users and Young Gamers Targeted, & More
Hacks, social engineering, and phishing dominated this week’s headlines, but cloud security is at the forefront of government officials’ minds. Catch up on all the latest in this week’s Friday Five!
How Data Sovereignty Made Data Protection King
The concepts of data protection and data sovereignty have become even more intertwined and crucial of late, especially in cloud computing environments.
Sign Up For Updates
Thank you for subscribing!