Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

Threat Update 59 – GitHub Data Leak Risks

GitHub is a crucial solution for the development community, but its popularity for both business and personal use can lead to accidental data leaks. Kilian Englert and Ryan O’Boyle from...

Read More

PeStudio Overview: Setup, Tutorial and Tips

PeStudio is a tool used for statically analyzing malware and is one of my favourite tools for malware analysis. Whenever I begin analysing a piece of malware, I will always...

Read More

TLS vs SSL: What’s the Difference & How it Works

It’s a bird……It’s a plane…..It’s…….a cryptographic networking protocol? While they may not be from the planet Krypton, Transport Layer Security (TLS) and Secure Sockets Layer (SSL) take on the Superman-like...

Read More

Microsoft LAPS Overview: Setup, Installation, and Security

Microsoft LAPS is one of the most effective ways to protect administrator passwords and prevent unauthorized users from accessing systems or data that they shouldn’t. Microsoft’s Local Administrator Password Solution...

Read More

Varonis extends security capabilities to Nutanix Files

The Varonis Data Security Platform now supports monitoring, alerting, and data classification in Nutanix Files, providing increased visibility and security over unstructured data. Monitor and secure Nutanix Files with Varonis...

Read More

The Ultimate Guide to Procmon: Everything You Need to Know

Knowledge is power when it comes to maintaining a proactive cybersecurity posture. Knowing what’s going on within your systems and monitoring networks for potential issues, hacks, or malware is critical...

Read More

Salesforce Security Guide: Best Practices

Data breaches exposed 36 billion records in the first half of 2020. This number continues to increase as more businesses go online, with more knowledge workers working remotely in 2021....

Read More

Google Workspace Data Protection Guide & Resources

Google Workspace, formerly known as G Suite, dominated the office productivity suite space in 2020, with a 59 percent US market share. Businesses worldwide continue to trust Google’s productivity and...

Read More

Texas Privacy Act: Overview and Compliance Guide

Many countries, states, and jurisdictions have recently passed — or are planning to pass — legislation to protect the privacy and data rights of consumers. The state of Texas is...

Read More

The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees

Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.