Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Compliance & Regulation


Varonis extends security capabilities to Nutanix Files

The Varonis Data Security Platform now supports monitoring, alerting, and data classification in Nutanix Files, providing increased visibility and security over unstructured data. Monitor and secure Nutanix Files with Varonis...

Read More

What is PSD2 Compliance and What Does it Mean for Your Business?

One of the newest regulations for payment services and processors is the European Union’s Payment Services Directive or PSD2. The PSD2 began taking effect in September of 2018 and is...

Read More

Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential

The world has never been more interconnected, with cloud and digital technology allowing companies to flourish and succeed globally. However, this interconnectedness comes with elevated risk  — partners, vendors, and...

Read More

Using Salesforce Analytics for GDPR Compliance

That is the total amount in fines imposed by the European Union on businesses for non-compliance to GDPR, data infringement, and breaches on data protection since the launch of the...

Read More

Your Complete HIPAA Compliance Checklist for 2021

The Health Insurance Portability and Accountability Act (HIPAA) is as important to the healthcare industry now more than ever — if not more. Hospitals, insurance companies and healthcare providers all...

Read More

5 Priorities for the CISO Budget In 2021

“Take the CISO job,” they said. “It’ll be great,” they said. The role of the Chief Information Security Officer has always been a dynamic one. From securing endpoints and networks...

Read More

California Privacy Rights Act (CPRA): Your Up-To-Date Guide to CCPA 2.0

Technology and social media giants like Facebook and Google are about to get a huge reality check in how they handle customer data. The California Privacy Rights Act (CPRA) is...

Read More

Risk Management Framework (RMF): An Overview

The Risk Management Framework (RMF) is a set of criteria that dictate how the United States government IT systems must be architected, secured, and monitored. Originally developed by the Department...

Read More

Cybersecurity Maturity Model Certification (CMMC): What You Need to Know

The United States Department of Defense is implementing the Cybersecurity Maturity Model Certification (CMMC) to normalize and standardize cybersecurity preparedness across the federal government’s defense industrial base (DIB). This piece...

Read More

Is Microsoft Office 365 HIPAA Compliant?

No. That’s the answer in their FAQ. Out-of-the-box Office 365 is not HIPAA compliant, and you need to take the appropriate steps to ensure your organization stays compliant. As the...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.