
EA Data Breach: What Happened, and How it Could be Prevented
Last week, news broke that games publisher Electronic Arts (EA) fell victim to a data breach....

Data Breach Risks from Microsoft Teams
Microsoft Teams has rapidly turned out to be the to-go-to application for remote work,...

Secure Access Service Edge: What is SASE? And Why It’s the Future for Cloud hosted Tech Stacks
The Software-as-a-Service (SaaS) industry is forecast to generate $157 billion by 2022, as more...

HIPAA Deep Dive Series: When is a Patient Authorization not needed for Sharing Personal Data?
HIPAA has strict rules governing patient data storage and sharing. However in limited...

What is the Principle of Zero Trust Security?
Zero Trust security is an IT security model centered around the concept that organizations should...

Colonial Pipeline Data Breach- Document Malware Likely Cause
Colonial Pipeline got hacked recently. The cyberattack that forced the United States' largest...

How Remote Work Setups Can Lead to Higher Risks of Sensitive Data Leaks
The benefits of a distributed, remote workforce are plentiful for organizations. From low costs to...

Current Trends in Phishing Emails
Phishing is the single most important risk for employees to introduce malware within...