What Is File Security? Best Practices & Tools for Security
File security is integral to effective cybersecurity. In today's blog we dig into the difference between file security and data security, best practices, and tools to implement for file security.
Friday Five: The Approaching Government Shutdown, Protecting Americans' Security and Privacy, & More
The approaching government shutdown brings major cybersecurity concerns, exacerbated by China-based hackers, and meanwhile, efforts to protect Americans’ data privacy and security are underway. Catch up on the latest in this week’s Friday Five!
What is Pretexting? Types, Examples, & Prevention
Pretexting attacks come in all kinds of shapes and sizes. Read this blog to familiarize yourself with the threat so you can keep members of your organization safe.
Friday Five: Malicious AI Campaigns, the Pentagon’s 2023 Cyber Strategy, & More
In the midst of the DHS and Pentagon releasing their Threat Assessment Report and unclassified Cyber Strategy, respectively, three major social media giants came under fire this past week. Catch up on all of these stories in this week’s Friday Five!
Friday Five: A Win for Data Privacy, Conti Members Sanctioned, & More
Wins against cybercrime and the invasion of data privacy took the headlines this past week, but phishing, business email compromise, and the effects of climate change remain as threats against organizations. Catch up on all these stories in this week’s Friday Five!
What is the CCPA and What’s Needed for Compliance?
You've heard of the CCPA but what are the costs of noncompliance? We answer those questions and look at how organizations can use a DLP solution to help facilitate CCPA compliance in this blog.
Friday Five: The U.S. Operation Against QakBot, Cybercrime Treaty and Water Infrastructure Concerns, & More
The operation against QakBot marks a cybersecurity win for the U.S., but concerns over critical infrastructure, data privacy, and cyber insurance largely overshadow it. Catch up on these stories and more in this week’s Friday Five.
Friday Five: Vulnerability Disclosure, Malicious QR Codes, Social Media Giants Challenged, & More
Between malicious QR codes, ransomware, and new legislation that would require increased vulnerability disclosures, organizations have a lot to pay attention to in this week's headlines. Catch up on it all in this week’s Friday Five!
Securing Your Data, For Now and Forever
In this blog, we ask six data protection experts how modern organizations can protect their data now and in the future.
Navigating the Australian Privacy Act 1988: Implications and Preparedness for Organizations
The Australian Privacy Act 1988 has been a cornerstone in protecting Australians’ privacy rights and governing how personal information is collected, used, and managed by organizations. Here you’ll find more about what the Privacy Act is and how it could impact you or your organization.
Sign Up For Updates
Thank you for subscribing!