Controlling the Blast Radius of an Attack
June 26, 2020, Data Security
It should come as no surprise to hear that the faster you can identify and… Read More
Why Transparency and Traceability Are Important Traits for Data Security
May 19, 2020, Data Security
Knowing what data we have, where it is located, how it is being accessed, and… Read More
COVID19 Is Playing Havoc with Anomaly Detection
April 8, 2020, Data Security
Normally, if an organization deployed a Data Security Platform with some sort of anomaly detection… Read More
Why Business Email Compromise is a Huge Risk to Data Security in 2020
February 26, 2020, Data Security
Business Email Compromise (BEC), formally known as the “man-in-the-email” scam, is a type of cyber-attack… Read More
What is the New York SHIELD Act? How to Be Compliant
January 16, 2020, Compliance
Since the advent of the GDPR, a number of data protections laws have started to… Read More
Key Data Privacy Issues and Trends for 2020
January 9, 2020, Data Security
Data privacy is undoubtedly going to become more of a priority for consumers in 2020,… Read More