Supply Chain Risk and Cybersecurity

Supply Chain Risk: The importance of vetting 3rd party vendors and their data protection tools   Modern organizations are increasingly interconnected, with complex supply chains extending across continents and categories. While this brings a range of business benefits, it also brings risks. Cyber-criminals understand how data is shared between links in the chain, and use…
Read more

Business Email Compromise

Business Email Compromise   Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list.   Broadly defined, BEC is a type of sophisticated scam targeting companies who conduct wire transfers, especially those with suppliers abroad.   The Email Compromise Scourge BEC operations…
Read more

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to navigate the sea of available…
Read more

Insider Threats and the difficulty in stopping data breaches

Insider Threats and the difficulty in stopping data breaches In dealing with today’s digital-threats, the main focus of companies, is by far on preventing attacks emanating from outside the organization.   Businesses invest fortunes on bolstering their digital defenses with ‘traditional’ tools such as firewalls and antivirus programs. Current estimates put the average number of…
Read more

The Full Potential of CARTA as envisaged by Gartner

How enterprises can realize the full potential of CARTA   Trust has traditionally been the cornerstone of network security. It’s what allows everything from files to data packets to move across a network, while also controlling permissions for end users.   But in modern networking, establishing trust is getting harder. Detection systems for cyberattack have…
Read more

Air Gap Data Protection

Among all the methods for securing digital data, the policy of air-gaping is certainly the most extreme. Drastic Measures As it’s name would imply, air-gaping is a security protocol that physically isolates a machine from a network.   Air-gaping most commonly involves cutting off a computer from the World Wide Web, but it can also be…
Read more