Unstructured data in documents, chats & tickets is making up a higher percentage of total...
Blog
What is the OSI Model?
The Open Systems Interconnection (OSI) model is a concept for standardizing the communication...
Zendesk: Is Sensitive Data Exfiltrating via Tickets?
Zendesk offers a lot of tools to help businesses improve the customer experience, including help...
Third-Party Installed Apps: Hidden Risks Inside your SaaS Platforms
Installed 3rd Party Apps over SaaS platforms are for enterprise what mobile App Store apps...
Two-Factor Authorizations: No Longer an Option for Any Organization
As cybercrime increases amid the COVID-19 chaos, companies are struggling to protect their...
Cybersecurity Perspectives from a Former FBI Agent
Kevin Kline, a 30+ year veteran of the FBI with a focus on National Security investigations, has...
What is CASB, and Why it Matters
Cloud-hosted products come with data exfiltration risks that are not well understood. This has...
The Ugly Truth about Security Software: Getting Buried Under too many False Positives
False positives are expensive!! According to a Critical Start survey, for every sixty minutes...
How are Security Leaders Thinking of 2021 Budgets
The rapid rate at which security technology is evolving can make it challenging to evaluate and...