Friday Five: The Vulnerable Healthcare Industry, Workplace Cyber Threats, & More
Per multiple sources, the healthcare industry is under an increasing number of attacks with no signs of threat actors slowing down. Meanwhile, Microsoft 365 and cloud service vulnerabilities are leaving users prone to attacks. Learn how you can stay safe in this week's Friday Five.
What Is the General Data Protection Regulation (GDPR)?
The General Data Protection Regulation (GDPR) is a regulation enacted by the European Union to protect EU citizens' privacy and personal data. Read this blog to learn more about who's subject to GDPR compliance, data subject rights, and the misconceptions around consent in GDPR compliance.
XDR vs EDR: What You Need to Know
XDR and EDR solutions can help secure your corporate ecosystem from cyber threats, especially with the increasing number of remote workers. Read this blog to learn the differences between the technologies, how they work, and how to choose between the two.
Friday Five: Threat Actors and Law Enforcement Throwing Punches, Vulnerability Concerns, & More
As ransomware gangs and state-sponsored threat actors wage war against international law enforcement, private organizations, U.S. courts and agencies, and the manufacturing industry are urged to reinforce their cybersecurity measures. Learn all you need to know about these emerging threats in this week's Friday Five.
What Is a Secure Web Gateway (SWG)?
A Secure Web Gateway (SWG) filters and blocks malicious internet traffic, preventing it from entering an organization's internal network. Learn more about how SWGs work, why they're important, and how they can help secure organizations in our new blog.
Friday Five: Adjusting Cyber Standards, Supply Chain Threats, & More
As Chinese ATPs and other cybercriminals escalate attacks against U.S. critical infrastructure, changes to cybersecurity standards and practices may be on the way for healthcare organizations and government agencies. Learn all you need to know in this week's Friday Five.
Understanding Saudi Arabia's NDMO Standards
A new framework from Saudi Arabia's National Data Management Office (NDMO) is aiming to simplify privacy and compliance in the country.
What is Cybersecurity? A Comprehensive Guide on Strategies, Technologies, and Best Practices
Cybersecurity protects computers, servers, mobile devices, systems, networks, and data from digital attacks, damage, and unauthorized access. Learn all about cybersecurity in this blog.
Friday Five: Botnets, Phishing Networks Thwarted, Supporting Federal Agencies and Critical Infrastructure, & More
As the federal government is working to secure critical infrastructure organizations and its own agencies, law enforcement is hard at work taking down large-scale phishing networks and state-sponsored botnets. Get up to speed on these stories and more in this week's Friday Five.
What is POPIA, and How Do You Achieve Compliance?
POPIA, South Africa's Protection of Personal Information Act, establishes rules for the lawful processing of personal information in South Africa. This blog looks at the purpose of the law, POPIA compliance best practices, and more.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!