Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

Complete Guide to Privacy Laws in the US

Contrary to conventional wisdom, the US does indeed have data privacy laws. True, there isn’t a central federal level privacy law, like the EU’s GDPR. There are instead several vertically-focused...

Read More

What is DNS Cache Poisoning? (Aka DNS Spoofing)

DNS cache poisoning is a cyber attack that tricks your computer into thinking it’s going to the correct address, but it’s not. Attackers use DNS cache poisoning to hijack internet...

Read More

110 Must-Know Cybersecurity Statistics for 2020

Cybersecurity issues are becoming a day-to-day struggle for businesses. Recent trends and cybersecurity statistics reveal a huge increase in hacked and breached data from sources that are increasingly common in...

Read More

How Honeypots Unmask Hackers & Scammers Online

A honeypot is a tool that acts as bait, luring an attacker into revealing themselves by presenting a seemingly tempting target. While advanced honeypots are designed to make it easier...

Read More

What Is Network Access Control? Solutions and Explanations

Given how complex the topic of cybersecurity is in today’s high-tech world, many organizations feel the need to tackle it from various angles. They procure an antivirus solution from one...

Read More

What is Data Loss Prevention (DLP)? Software and Solutions

Data Loss Prevention (DLP) software protects data from theft or loss that could cost your company in fines or productivity. DLP solutions cover a wide variety of techniques to protect...

Read More

What is Identity Access Management?

Identity and Access Management (IAM) is a core discipline for any information technology operational group. The first element is identity, which means verifying that a user is the person they...

Read More

Cybersecurity Memo Templates and Awareness Flyers Employees Won’t Forget

National Cybersecurity Awareness Month comes around every October, but you shouldn’t rely on one month being enough to drive home the importance of cybersecurity to your employees. You should promote...

Read More

How Hackers Use OSINT to Find Business Data

Hackers do their homework when picking a target, often relying on information left publically exposed to make decisions about how to attack. Whether an OSINT researcher is a hacker looking...

Read More

What is an Insider Threat? Definition and Examples

An insider threat is a security risk that originates within the targeted organization. This doesn’t mean that the actor must be a current employee or officer in the organization. They...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.