Privacy Shield Revoked
What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies On July 16th, the European Court of Justice (ECJ) struck down the EU-US data…
5 Ways to Avoid Security Automation Pitfalls
By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to boost threat detection and response….
Media Content Captured on Mobile Is Driving Compliance Problems
Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, Inkscreen Recent headlines are once again demonstrating the consequences of employees’…
Funding Schemes and Cyber Security
By Milica D. Djekic What a lovely day; you are just searching your web for some online business opportunities or you are reviewing the cyberspace to get the stipend for…
The “New Normal” – Navigating Remote Work and Security in the COVID-19 Era
By Bill Delisi, CEO of GOFBA There are many “new normal” that apply to different parts of life and certain industries. For cybersecurity, a core change to the landscape is…
Securing the Weakest Links in Today’s Public Cloud Environments
By Avi Shua, CEO, Orca Security The demand for cloud security is continuing to explode, with short-term needs being accelerated by the shift to remote work during the pandemic. According…
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes…
Protecting a Mobile Workforce with Hybrid DNS Security
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox The future of the workplace is undoubtedly a remote workforce, accessing the corporate network via mobile devices and the…
What Is Being Done, And How Can They Improve?
By Martin Banks People have worried about the safety of nuclear energy since it first came around in the mid-twentieth century. Nuclear energy has a lot of potential for powering…
Industrial Control System – Security Focus of Federal Effort
By Trip Hillman, Director of Cybersecurity Services at Weaver More and more, industrial control systems have been the targets of malware, ransomware, and other kinds of cyberattacks. These attacks jeopardize…
Covid-19 Unveiled a New Security Gap
By Eddy Bobritsky, CEO & Co-Founder, Minerva Labs As COVID-19 spreads, more organizations are enforcing remote work from home, making employees home computers more vulnerable than ever to cyberattacks. The…
Is API Usage Putting Your Organization Out of Compliance?
By Matt Keil, Director of Product Marketing, Cequence Security APIs (“Application Programming Interfaces”) are increasingly being used as the conduit for data exchange between applications, infrastructure, and IoT devices. The…