Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Cindy Ng

[Podcast] Security and Privacy Concerns with Chatbots, Trackers, and more

The end of the year is approaching and security pros are making their predictions for 2018 and beyond. So are we! This week, our security practitioners predicted items that will...

Read More

[Podcast] Privacy Attorney Tiffany Li and AI Memory, Part II

Tiffany C. Li is an attorney and Resident Fellow at Yale Law School’s Information Society Project. She frequently writes and speaks on the privacy implications of artificial intelligence, virtual reality,...

Read More

[Podcast] Privacy Attorney Tiffany Li and AI Memory, Part I

Tiffany Li is an attorney and Resident Fellow at Yale Law School’s Information Society Project. She frequently writes about the privacy implications of artificial intelligence, virtual reality, and other disruptive...

Read More

[Podcast] Bring Back Dedicated and Local Security Teams

Last week, I came across a tweet that asked how a normal user is supposed to make an informed decision when a security alert shows up on his screen. Great...

Read More

Why A Honeypot Is Not A Comprehensive Security Solution

A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...

Read More

[Podcast] What Does the GDPR Mean for Countries Outside the EU?

The short answer is: if your organization store, process or share EU citizens’ personal data, the General Data Protection Regulation (GDPR) rules will apply to you. In a recent survey,...

Read More

[Podcast] John P. Carlin, Part 4: Emerging Threats

In this concluding post of John Carlin’s Lessons from the DOJ, we cover a few emerging threats: cyber as an entry point, hacking for hire and cybersecurity in the IoT...

Read More

[Podcast] Tracking Dots, Movement and People

Long before websites, apps and IoT devices, one primary way of learning and sharing information is with a printed document. They’re still not extinct yet. In fact, we’ve given them an...

Read More

[Infographic] From Bad Report Cards to Insider Data Theft

We’ve all read the news recently about employees and contractors selling internal customer data records or stealing corporate intellectual property. But insiders breaking bad have been with us as long...

Read More

[Podcast] John P. Carlin, Part 3: Ransomware & Insider Threat

We continue with our series with John Carlin, former Assistant Attorney General for the U.S. Department of Justice’s National Security Division. This week, we tackle ransomware and insider threat. According...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.