GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations

As many organizations are still discovering, compliance is complicated. Stringent regulations, like the GDPR and the CCPA, require multiple steps from numerous departments within an enterprise in order to achieve and maintain compliance. From understan… Continue reading GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations

When your laptop is your workspace, the real office never closes

With the COVID-19 pandemic, working from home has moved from a company perk to a hard requirement. Social distancing government mandates have forced complete office closures completely transforming how and where people work. With people working from ho… Continue reading When your laptop is your workspace, the real office never closes

April 2020 Patch Tuesday forecast: Uncertainty reigns, but patching endures through pandemic

I should have reserved the title from last month’s article – Let’s put the madness behind us for this month. Of course, it has a completely different meaning now in the wake of the COVID-19 pandemic chaos. The biggest change and challenge for most of u… Continue reading April 2020 Patch Tuesday forecast: Uncertainty reigns, but patching endures through pandemic

10 considerations in order to ensure business continuity for PKI

Every year, enterprises face unforeseen events that can disrupt operations. These events are rarely predictable and often create significant challenges for IT and security teams, the network, and even hardware supply chains. That’s where business conti… Continue reading 10 considerations in order to ensure business continuity for PKI

Know thy enemy: The evolving behaviors of today’s cybercriminals

Organizations in the energy/utilities, government, manufacturing, and healthcare sectors have witnessed an increase in cyberattacks over the past year. In fact, recent research found that nearly 1,000 government agencies and healthcare institutions exp… Continue reading Know thy enemy: The evolving behaviors of today’s cybercriminals

Cybersecurity during the pandemic: Try these security solutions for free!

In order to help global organizations of all sizes address cybersecurity during the COVID-19 pandemic, a number of vendors provide free (time-limited) access to their solutions. All of the offers below are available immediately, and they cover a number… Continue reading Cybersecurity during the pandemic: Try these security solutions for free!

Radio frequency: An invisible espionage threat to enterprises

You can’t see it, but corporate airspaces are under attack via radio frequencies. Foreign governments, competitors and cyber criminals are all conducting radio-based attacks on enterprises. These sophisticated attacks use compromised RF devices as thei… Continue reading Radio frequency: An invisible espionage threat to enterprises

Full-time bug hunting: Pros and cons of an emerging career

Being a bug hunter who discloses their discoveries to vendors (as opposed to selling the information to the highest bidder) has been and is an ambition of many ethical hackers. Before vendors started paying for the info, the best they could hope for wa… Continue reading Full-time bug hunting: Pros and cons of an emerging career

A client-side perspective on web security

Threats to web security are explained in this first of a three-part article series, and client-side security is shown to address a commonly missed class of cyber attack exemplified by Magecart. Traditional solutions to web security are outlined, includ… Continue reading A client-side perspective on web security

5 questions about website and brand security every business owner should ask

Your website is the primary way your customers interact with your enterprise. You envision and create a website to: Enhance customer engagement and conversion of visitors to customers. Optimize revenue per customer. Create repeat customers. Retain cust… Continue reading 5 questions about website and brand security every business owner should ask