Featured Post

Stop Email Phishing with Behavioral Science

An insightful interview with Zachary Eikenberry (founder of Hook Security). In this video we discuss:– Humans as the most vulnerable security aspect of an org– The power of nudge– Humor to educate on tough topics– Easy ways of stopping email phishing [...]

Read More...

5 Myths of Data Governance and Security

Read...

WEBINAR: Implementing Compliance, Security & Privacy (Perspectives from High Growth Fintechs)

Join us on Sept. 22 at 12pm ET as we discuss the following agenda: How banks and fintechs deal with today’s new remote working environment Day 0 security mindset, security-based company stack...

Release Notes: Polymer DLP VCO for Github & Bitbucket

High level feature notes for code scanner integrations -Scan a set of pre-defined repositories to identify Org-level sensitive data within codebase -Repositories can be scanned in the following ways:...

Are CASBs the Panacea for Cloud Security?

A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud...

Database Access Controls & Hidden Data Breach Risks

Most data breaches from inside the organizations are still due to unfettered database access. It is critical for any executive to have a basic understanding of what database controls look like from a...

7 Team Culture Tips and Practices to Drive Cybersecurity and Privacy

The best cybersecurity and privacy regimes will never work if your team members do not actively protect company efforts. Here is the precursor to how top-down security infrastructures have...

Privileged Access of Information in an Enterprise: Brief History & the Future

Perimeter security has historically provided the analogy of protecting the keys to the kingdom for Enterprises. Once you have been approved to enter the drawbridge which typically consists of...

Using Natural Language Processing (NLP) based Sentiment Analysis for Risk & Trading: Mixed Bag!

Summary We have built and/or integrated various Machine Learning models over the years within the Financial Services. The success of these projects generally lie in tight requirements and good data...

Is your Codebase Leaking Sensitive Data?

Pressure leads to shortcuts. Commenting in code is one of those shortcuts and shortcuts can introduce risks. A typical issue with commented code? Confidential data is left exposed. Maybe the...

Offshore Development Teams: Data Breach and Security Risks Abound!

Large number of businesses leverage offshore technology teams. However, very few of those companies have data governance on customer data nor understanding of the cyber-security risks...

Compliance Challenges in Client facing Chats on Zoom/Slack/Zendesk et al

Client facing Slack and Zoom channels are especially useful for the direct and safe communication and support environment. For this reason, these client-facing chat rooms can also act as sources of...

Third-Party Apps on Slack: Lurking Data Security Threat

Permissions: What Can Third-Party Apps Access? Many Slack users are unaware of the permissions that may become enabled when third-party applications are linked with one’s Slack account. According...

Request A Demo For Enterprise Solutions