Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Articles by

Cindy Ng

With KeRanger, Mac Users Are No Longer Immune to Ransomware Threats

Cybercriminals who previously targeted Windows operating systems with ransomware have expanded their customer base to include the Mac OS. Known as KeRanger, it’s the first ransomware variant detected that infects...

Read More

Our Interview With Attorney and Data Scientist Bennett Borden [TRANSCRIPT]

We really enjoyed our talk with Bennett Borden a few weeks ago and hope you had a chance to listen to the podcasts. Since there was so much information being...

Read More

Building a Security Culture

In addition to demonstrating quick wins so that your CEO will take data security seriously, you should also be planning for the long term by building strong security awareness within...

Read More

New Updates to the CIS Critical Security Controls

If you haven’t already heard, the Top 20 Critical Security Controls has a new name. Last year, after the Center for Internet Security(CIS) integrated with the Council on Cybersecurity, the...

Read More

7ev3n Demands a Whopping 13 Bitcoins to Decrypt Your Data

7ev3n is a new ransomware that encrypts your data and demands 13 bitcoins – or approximately $5,000USD – to decrypt your files. It’s the largest ransom we’ve seen to date...

Read More

Social Engineering Remains a Top Cybersecurity Concern

In 2016, the top cyberthreat for IT pros, at least according to ISACA’s Cybersecurity Snapshot, is social engineering.  It has always been a classic exploit amongst the hackerati. But in...

Read More

Current Privacy Risks in Genetic Testing

The idea of taking a direct-to-consumer(DTC) genetic test is intriguing. What was once considered an expensive test that could only be performed in a medical environment can now be purchased...

Read More

Varonis and the Building Security in Maturity Model (BSIMM)

With major security threats and vulnerabilities making headlines daily, it’s good to hear there’s now a way for organizations to share experiences and strategically work together. Through the Building Security...

Read More

Design Thinking for your Data Strategy

A fact of life for many Chief Data Officers (CDOs) is that once you’ve achieved certain milestones in your data strategy, your focus will inevitably shift to a new milestone...

Read More

Five Things You Need to Know About the Proposed EU General Data Protection Regulation

European regulators are serious about data protection reform. They’re inches away from finalizing the General Data Protection Regulation (GDPR), which is a rewrite of the existing rules of the road...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.