Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

Google Workspace Data Protection Guide & Resources

Google Workspace, formerly known as G Suite, dominated the office productivity suite space in 2020, with a 59 percent US market share. Businesses worldwide continue to trust Google’s productivity and...

Read More

Texas Privacy Act: Overview and Compliance Guide

Many countries, states, and jurisdictions have recently passed — or are planning to pass — legislation to protect the privacy and data rights of consumers. The state of Texas is...

Read More

The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees

Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for...

Read More

Threat Update 54 – SSO Imposter: Intrusion

Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers...

Read More

Azure CLI Overview: Setup, Comparison, and Integration Tips

If you are just learning about Azure, most likely you are working in the Azure Portal. You have probably created resources like virtual machines and storage accounts by using the...

Read More

Threat Update 52 – 2021 SaaS Risk Report

Cloud solutions have changed the way we do business, allowing organizations to leverage the scale and flexibility of SaaS, and IaaS platforms, and support an increasingly mobile “work from anywhere...

Read More

How to Fix Broken Registry Items: Visual Guide and Solutions

Broken Registry Items have been the thorn in many an IT admin’s side almost since the day Microsoft introduced the Registry concept in Windows 3.1. Modern flavors of Windows tend...

Read More

Ultimate Ransomware Guide: Types and Definitions of Ransomware Attacks

Ransomware attacks can result in significant loss of data, system functionality, and financial resources. But exactly what is ransomware? Ransomware can take a variety of shapes and forms, not to...

Read More

Threat Update 51 – LockBit and Insider Threats for Hire

Organizations face threats from all sides – both external attackers trying to get in, and internal “trusted” employees going rogue. It was only a matter of time before these two...

Read More

Think Your Data Is Secure? Three Questions You Need To Answer Right Now

As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.