What We Can Learn from the Colonial Pipeline Breach

On June 8, 2021, Joseph Blount, President and Chief Executive Officer of Colonial Pipeline, appeared before the United States Senate Committee on Homeland Security and Governmental Affairs regarding the breach that injected ransomware into their serve… Continue reading What We Can Learn from the Colonial Pipeline Breach

Data Protection in the K-12 Cloud

Episode 12: Data Protection in the K-12 Cloud The use of cloud technology in K-12 schools has greatly increased over the past year. This has made districts a top target by cyber criminals, and it’s becoming more important that the sensitive data stored… Continue reading Data Protection in the K-12 Cloud

Six Key Characteristics of a Modern ZTNA Solutions

Even as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while simultaneously supporting a portion of the workforce… Continue reading Six Key Characteristics of a Modern ZTNA Solutions

What are good mitigations for balancing secure external anonymous sharing from Sharepoint/One with convenience?

What are good mitigation techniques to allow corp users to share files externally with anyone, yet maintain some kind of control?
Ie. OneDrive and SharePoint can allow users to share a file with “anyone” indefinitely.
This is risky as that… Continue reading What are good mitigations for balancing secure external anonymous sharing from Sharepoint/One with convenience?

Creating Policies & Automating Enforcement for Data Loss Prevention

Episode 10: Creating Policies & Automating Enforcement for Data Loss Prevention School districts this year have likely had more data created, shared, and stored from outside of school than ever before—meaning data loss prevention is at the top of t… Continue reading Creating Policies & Automating Enforcement for Data Loss Prevention

Six Key Characteristics of a Modern Secure Web Gateway

As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A recent… Continue reading Six Key Characteristics of a Modern Secure Web Gateway

3 Foundations of a Data Security Strategy

Data is one of the most important assets your organization has, and protecting it is no longer optional. Cyberattacks can come in multiple forms, including outsider attacks such as phishing or malware, as well as insider threats via social engineering… Continue reading 3 Foundations of a Data Security Strategy