What are the New FTC Requirements for GLBA?

The GLBA Overhaul: What you Need to Know New FTC data requirements are coming into effect by year’s end. The changes are expected to have a major impact across industries, including those outside the financial sector. In late 2021, the

Read More »

What is Cybersecurity Maturity Model Certification or CMMC?

The Defense Department certification program known as Cybersecurity Maturity Model Certification, or CMMC, is currently in the final rollout stages.    The CMMC’s official site describes the protocols as a “comprehensive framework to protect the defense industrial base” from increasingly

Read More »

2022 Market Guide for Data Loss Prevention (DLP)

Industry thought leader Gartner recently published its July 2022 Market Guide for Data Loss Prevention (DLP)[i]. In the thirteen-page report, Gartner laid out the most pressing needs of business networks, the data security challenges they face, and the most effective

Read More »

Business Email Compromise (BEC)

Fighting business email compromise (BEC) has become one of the top challenges for enterprise security professionals. The cost of falling victim to BEC incidents has been on a sharp uptick for years, with hackers discovering more and more exploits in

Read More »

Is XDR (eXtended detection and response) different from DLP?

Extended detection and response or “XDR”, a new, and much lauded approach to threat detection and response. According to its proponents, XDR provides holistic protection against cyberattacks, unauthorized access, and general misuse of data. The capabilities touted by XDR supporters

Read More »

EDM, Fingerprinting, & Accuracy in Data Security

Protecting PII is Still a Problem Protecting PII is one of the central challenges for today’s enterprises.  Firms large and small invest heavily in security budgets to ensure their networks are well protected and data remains intact. But before organizations can

Read More »