TL;DR Changes to the HIPAA Privacy Act are expected this yearAt their core, these changes will...
Blog
How To Secure Identity and Access Management
TL;DR Your employees' passwords are a holy grail to hackers Identity and access management is...
How does a Business Email Compromise occur?
TLDR? Business Email Compromise (BEC) attacks account for losses that are a massive 64 times...
5 Ways Cloud DLP Helps Secure PHI
TD; LR? The healthcare industry has consistently suffered the highest data breach costs for the...
Data Security Challenges Posed by Slack and Teams for Financial Services
TLDR? Slack and Teams usage is sky-rocketing in FS organizations but, in a sector that is highly...
How to Secure Data in Your SaaS-Based Collaboration Tools
TL;DR? While SaaS applications are great for productivity, they are becoming a massive data...
What CASB is right for my business?
TL;DR? Without a CASB, companies can’t know what cloud apps their employees are accessing, what...
Why is Email still the Biggest Source of Sensitive Data Leaks?
TL;DR? Traditional employee training and email protection solutions won't protect you from a data...
What’s the difference between a data breach and a data leak?
TL;DR? Data leaks are due to insider actions. Data breaches happen because of cybercriminals'...