False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to ensure IP and personal data are protected. Make…
Read more

What is Data Loss Prevention Shelfware

Data Loss Prevention (DLP) Shelfware With the huge volume of sensitive data companies must deal with today, it’s no wonder data loss protection (DLP) still tops the list of administrator concerns.   Despite the attention however, it seems that getting DLP right remains easier said than done.   Even major government agencies, with ample resources…
Read more

Supply Chain Risk and Cybersecurity

Supply Chain Risk: The importance of vetting 3rd party vendors and their data protection tools   Modern organizations are increasingly interconnected, with complex supply chains extending across continents and categories. While this brings a range of business benefits, it also brings risks. Cyber-criminals understand how data is shared between links in the chain, and use…
Read more

Business Email Compromise

Business Email Compromise   Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list.   Broadly defined, BEC is a type of sophisticated scam targeting companies who conduct wire transfers, especially those with suppliers abroad.   The Email Compromise Scourge BEC operations…
Read more

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to navigate the sea of available…
Read more

Insider Threats and the difficulty in stopping data breaches

Insider Threats and the difficulty in stopping data breaches In dealing with today’s digital-threats, the main focus of companies, is by far on preventing attacks emanating from outside the organization.   Businesses invest fortunes on bolstering their digital defenses with ‘traditional’ tools such as firewalls and antivirus programs. Current estimates put the average number of…
Read more