Document-based malware is pretty common these days. An email analysis by Barracuda Networks...
Blog
What is Sensitive Data?
Every time you sign up for a new service, buy something online or, even apply for a job, you...
Shadow IT 2.0: New Risks in the PaaS Era
For IT and security leaders, the term ‘shadow IT’ tends to send a shiver down the spine. About ten...
What is Data Loss Prevention (DLP)?
Data breaches have become a regular mainstay of daily life. For every security patch or...
What is Personal Identifiable Information (PII)?
In a hyper-connected world, individual data footprints can be found everywhere. Each day, millions...
Monthly Cyber Risks Report for all employees-Security Culture Builder
According to a 2021 PwC report, 71 percent of CEOs in the United States want to know their...
Stop Email Phishing with Behavioral Science
An insightful interview with Zachary Eikenberry (founder of Hook Security). In this...
What is Shadow IT?
Lurking in the shadows of every organization, employees are accessing, transferring, and...
What is a Data Breach?
In July 2019, the security hotline for Capital One received an anonymous call. According to the...