Take control over data in a SaaS environment with BYOK Min-Hank Ho August 23, 2023 Bring your own key (BYOK) encryption can help security leaders protect their data while utilizing Software as a Service (SaaS) applications.Read More
The 5 pillars of cloud security for data storage Faye Ellis May 31, 2023 Rather than debating the ways that the cloud is or isn’t inherently secure, leaders should question whether they are using the cloud securely. Read More
The U.S., U.K. and Germany rank top in ransomware attacks Security Staff April 25, 2023 Cyberattacks have increased over the past few years. Ransomware attacks from April 2022 to March 2023 were analyzed in a recent report by Black Kite. Read More
Encryption bridges gap between data protection & digital identity Lucas Queiroz April 18, 2023 In this digital age, trust is paramount. Trust between individuals, governments and private companies is first established through identification. Read More
Reducing RPA security risk Anthony Moillic February 14, 2023 Robot process automation (RPA) has expanded to meet workforce needs. Unfortunately, RPA can put the sensitive data that it touches at risk. Read More
It's time to prepare for quantum computing’s impact on DNS security Peter Lowe February 14, 2023 When quantum computing makes its entrance, it could eviscerate online communications. Cybersecurity efforts to prevent quantum attacks can’t wait.Read More
LastPass breach affects Virginia Tech security posture Security Staff January 16, 2023 Virginia Tech IT security leaders advised LastPass users to change their passwords to protect against data breaches and paused their LastPass rollout.Read More
The difference hardware encryption makes Rich Kanadjian December 12, 2022 While there are several different solutions for transporting data, hardware-encrypted storage drives provide the highest level of data security.Read More
Apple to encrypt iCloud backups to boost security & privacy Security Staff December 8, 2022 Apple has introduced three advanced security features focused on protecting against threats to user data in the cloud. Read More
To encrypt or not to encrypt — That is the question Yuval Khalifa December 7, 2022 What are some of the most widely used encryption protocols and how do they work? Read More