Microsoft Purview Sensitivity labels, best practices for setup?

Background
There have been more than a handful of recent security breaches at my company, involving social engineering and spoofed emails.
A malicious actor fraudulently spoofing one of our customers, sends an email to a user at my company… Continue reading Microsoft Purview Sensitivity labels, best practices for setup?

How can we restrict users from copying "non-allowed" file types from USB?

We blocked USB ports on most of the devices using Intune. However, a subset of users requires USB access due to their job scope which requires them to copy images from their cameras to their PCs. Is there a way we can restrict users from c… Continue reading How can we restrict users from copying "non-allowed" file types from USB?

How to Prevent Data Leakage in Microsoft Teams with Data Loss Prevention

As more employees shift to working remotely, it is more important than ever that organizations prioritize protecting their business-critical and sensitive data across apps, endpoints, and cloud services. Employees will be accessing, sharing, creating, and storing data in new ways than before, meaning the need to make sure this is protected and compliant is more […] Continue reading How to Prevent Data Leakage in Microsoft Teams with Data Loss Prevention

Understanding Microsoft Information Protection

There are a lot of compliance-based services across Microsoft 365’s licensing options. At the highest level, a Microsoft 365 E5 subscription for a tenant gives administrators a ton of toys to play with. The naming, marketing, and placement of the capabilities you get can be fuzzy. In this article, we’ll tackle Microsoft Information Protection (MIP), […] Continue reading Understanding Microsoft Information Protection

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were recently the only company named a Leader and Fast Mover in the GigaOm Radar Report for Data Loss Prevention. If you’re interested in checking out t… Continue reading The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

4 key areas SaaS startups must address to scale infrastructure for the enterprise

As companies grow, their security and reliability needs evolve. When working with large customers, having empathy for these needs will go a long way. Continue reading 4 key areas SaaS startups must address to scale infrastructure for the enterprise

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

Secure Web Gateways (SWGs), software for controlling access to websites and SaaS not managed by corporate IT, have evolved from hardware appliances installed on premises, to software running on end user devices with varying degrees of interaction with… Continue reading Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

To guard against data loss and misuse, the cybersecurity conversation must evolve

People — not applications, networks or endpoints — have become the primary security perimeter in today’s cloud-first, choose-the-handiest-device, collaboration-obsessed world. Continue reading To guard against data loss and misuse, the cybersecurity conversation must evolve