Business Email Compromise Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list. Broadly defined, BEC is a type of sophisticated scam targeting companies who … Read More
Monthly Archives: July 2019
Discover Dark Data
Information overload. One of the key phenomena that has come to define the digital age. The consequences of this information glut cover a wide spectrum. From the analytical perspective, finding answers to important questions and identifying what constitutes … Read More
Insider Threats and the difficulty in stopping data breaches
Insider Threats and the difficulty in stopping data breaches In dealing with today’s digital-threats, the main focus of companies, is by far on preventing attacks emanating from outside the organization. Businesses invest fortunes on bolstering their digital defenses with … Read More
The Full Potential of CARTA as envisaged by Gartner
How enterprises can realize the full potential of CARTA Trust has traditionally been the cornerstone of network security. It’s what allows everything from files to data packets to move across a network, while also controlling permissions for end users. … Read More
Air Gap Data Protection
Among all the methods for securing digital data, the policy of air-gaping is certainly the most extreme. Drastic Measures As it’s name would imply, air-gaping is a security protocol that physically isolates a machine from a network. Air-gaping most commonly … Read More