Friday Five: Critical Infrastructure at Risk, the New DBIR, and the Rising Sextortion Threat
Verizon's latest Data Breach Investigations Report (DBIR) was released this past week, but it shared the headlines with malware attacking Minecraft users, an FBI alert of rising sextortion attacks, and more. Catch up on all these stories and more in this week’s Friday Five!
What is ITAR Compliance? (Regulations, Fines, & More)
Learn about ITAR compliance in Data Protection 101, our series on the fundamentals of information security.
Friday Five: New Research in Cyber Psychology, Vulnerabilities, & a Hacker Forum Leak
This past week saw warnings of potential vulnerabilities, PyPI upping their security measures, and a massive hacking forum leak. Catch up on these stories and more in this week’s Friday Five.
Data Loss Prevention Policy Template: How To Create a Data Loss Prevention Policy
Implementing a DLP policy can help put safeguards around data in your organization. In this blog, we walk you through the steps to creating an effective DLP policy, including how to outline specifications around data classification, handling, and discovery.
Friday Five: Meta Fined, Critical Infrastructure at Risk, & Spyware in Action
A massive GDPR fine, threats against critical infrastructure, and spyware took over the headlines this past week. Catch up on all of these stories in this week’s Friday Five!
Friday Five: Android Malware, More Law Enforcement Action, New NIST Guidance, & More
Despite law enforcement’s best efforts to combat and take down cybercriminals, home routers, Android phones, and Android-based TV boxes are all being threatened by new malware. Catch up on all the latest in this week’s Friday Five!
Friday Five: Law Enforcement Finding Success, But Ransomware Remains Troublesome
Law enforcement saw quite a bit of success this past week, but ransomware and cyberespionage operations are remaining aggressive. Catch up on these stories and more in this week’s Friday Five.
What is the Principle of Least Privilege (POLP)?
Learn about the benefits of implementing the principle of least privilege in Data Protection 101, our series on the fundamentals of information security.
Data Protection: Data In transit vs. Data At Rest
Learn about approaches to data protection for data in transit vs. data at rest in Data Protection 101, our series on the fundamentals of data security.
What is Cyber Hygiene? A Definition of Cyber Hygiene, Benefits, Best Practices, and More
Learn about cyber hygiene in Data Protection 101, our series on the fundamentals of information security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!