What is ITAR Compliance? (Regulations, Fines, & More)
Learn about ITAR compliance in Data Protection 101, our series on the fundamentals of information security.
Friday Five: New Research in Cyber Psychology, Vulnerabilities, & a Hacker Forum Leak
This past week saw warnings of potential vulnerabilities, PyPI upping their security measures, and a massive hacking forum leak. Catch up on these stories and more in this week’s Friday Five.
Data Loss Prevention Policy Template: How To Create a Data Loss Prevention Policy
Implementing a DLP policy can help put safeguards around data in your organization. In this blog, we walk you through the steps to creating an effective DLP policy, including how to outline specifications around data classification, handling, and discovery.
Friday Five: Meta Fined, Critical Infrastructure at Risk, & Spyware in Action
A massive GDPR fine, threats against critical infrastructure, and spyware took over the headlines this past week. Catch up on all of these stories in this week’s Friday Five!
Friday Five: Android Malware, More Law Enforcement Action, New NIST Guidance, & More
Despite law enforcement’s best efforts to combat and take down cybercriminals, home routers, Android phones, and Android-based TV boxes are all being threatened by new malware. Catch up on all the latest in this week’s Friday Five!
Friday Five: Law Enforcement Finding Success, But Ransomware Remains Troublesome
Law enforcement saw quite a bit of success this past week, but ransomware and cyberespionage operations are remaining aggressive. Catch up on these stories and more in this week’s Friday Five.
What is the Principle of Least Privilege (POLP)?
Learn about the benefits of implementing the principle of least privilege in Data Protection 101, our series on the fundamentals of information security.
Data Protection: Data In transit vs. Data At Rest
Learn about approaches to data protection for data in transit vs. data at rest in Data Protection 101, our series on the fundamentals of data security.
What is Cyber Hygiene? A Definition of Cyber Hygiene, Benefits, Best Practices, and More
Learn about cyber hygiene in Data Protection 101, our series on the fundamentals of information security.
Friday Five: Dark Web Arrests, Apple and Google’s New Security Features, & More
Law enforcement saw big wins this past week with the arrest of nearly 300 cybercriminals and the seizure of nine crypto exchanges, Apple and Google released their new security features, and charging your phone at the airport may be safe after all. Catch up on all the latest in this week’s Friday Five!
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!