Featured Post

A CFO’s Guide to Purchasing Security Products

In today’s digital world, a brand’s credibility is intrinsically linked to its ability to protect its data and IT infrastructure. This means that to maintain market share, keep customers satisfied and improve profits, choosing the right cybersecurity products is a must.  Deciding which cybersecurity solutions to use was once in the power of CIOs and [...]

Read More...

The Top 3 Data Breach Causes of 2021, and How they Could be Avoided

This year is shaping up to be a record setter in terms of data breaches. There were 491 incidents in the US in Q2 2021, an almost 40% increase over the same period last year. In fact, the number of...

A CFO’s Guide to Purchasing Security Products

In today’s digital world, a brand’s credibility is intrinsically linked to its ability to protect its data and IT infrastructure. This means that to maintain market share, keep customers...

What is Data Mapping?

Definition Common Data Mapping Techniques Examples Data Management Sensitive Data Requirement Best Practices Data is the lifeblood of the modern organization, and the number of data sources companies...

What Type of Security Testing to Use?

Security certifications such as SOC2, ISO27001 are great for an overall assessment of your tech and data governance posture. However these certifications are somewhat subjective and do not reflect an...

Subscribe to our newsletter

A Beginner’s Guide to XDR: Extended Detection and Response

Definition Features of XDR What Makes XDR Different Advantages Challenges XDR Stats What is XDR? Recent research from Microsoft shows that cyber criminals – and their attacks – are...

What is ISO 27701? How is it different from ISO 27001?

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) are recognized internationally as authorities on management systems and best...

What is Endpoint Security, and Why It’s Critical in the Post-Covid Era

According to Gartner research, between 30 and 40% of employees will continue to work remotely after the end of the pandemic. It’s clear that distributed work is here to stay. So, it’s time for IT...

4 Examples of how Data Leaks from 3rd Party SaaS [3 min Video]?

This video explains the risks of sensitive data leak especially collaborative platforms such as: Chats (Slack, Teams) Tickets (Zendesk, Jira) Storage (GDrive, Sharedpoint) Codebase (Github, Gitlab)...

Why Do DLP solutions Suck?

Data loss protection products were once hailed as the panacea of security programs. Now they are more likely to be deemed as an expensive investment, with low ROI and a high amount of time-suck for...

HIPAA Privacy Rules for Non-Covered Entities

HIPAA data governance extends beyond doctors and healthcare providers to most entities providing services in the healthcare area. Understanding the role and responsibilities of the service providers...

Request A Demo For Enterprise Solutions