Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

David Harrington

Government Community Cloud: Primer on GCC High, GCC and DOD

Data security is paramount for federal agencies and contractors. This is especially true when it comes to doing business in the cloud. This is why many government teams utilize Government...

Read More

Addressing New Federal IT Work From Home Risks

Over the past year, working from home has gone from a temporary necessity to the new normal for many industries. United States federal government and Department of Defense (DoD) workers...

Read More

Your Complete HIPAA Compliance Checklist for 2021

The Health Insurance Portability and Accountability Act (HIPAA) is as important to the healthcare industry now more than ever — if not more. Hospitals, insurance companies and healthcare providers all...

Read More

California Privacy Rights Act (CPRA): Your Up-To-Date Guide to CCPA 2.0

Technology and social media giants like Facebook and Google are about to get a huge reality check in how they handle customer data. The California Privacy Rights Act (CPRA) is...

Read More

A Step-By-Step Guide to California Consumer Privacy Act (CCPA) Compliance

California is the first state to introduce data privacy protection regulations on par with the EU’s General Data Protection Regulation (GDPR). As one of the first pieces of digital consumer...

Read More

Data Security: Importance, Types, and Solutions

Data security is a set of processes and practices designed to protect your critical information technology (IT) ecosystem. This included files, databases, accounts, and networks. Effective data security adopts a...

Read More

The 12 PCI DSS Requirements: 4.0 Compliance Checklist

Digital payments are expected to reach an all-time high this year. Projections have digital payment transactions increasing by upwards of 24 percent in 2020 year-over-year, a trend that shows no...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.