How to Protect Structured and Unstructured Data

Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and structured data c… Continue reading How to Protect Structured and Unstructured Data

Lessons in Securing Development Environments

The new world of software development is inherently collaborative — development teams are geographically dispersed and require easily accessible and automated tools to ship products and features quicker with confidence. The new generation of developme… Continue reading Lessons in Securing Development Environments

The Perils of a Running Start: Can You Skip SOC 2 Type 1?

We’re often asked by customers embarking on the SOC 2 journey, “Can we skip the SOC 2 Type 1 and go straight into a Type 2?” They reason that instead of paying for two audits, they would only pay for one. It seems like an easy choice, righ… Continue reading The Perils of a Running Start: Can You Skip SOC 2 Type 1?

Passwords a Threat to Public Infrastructure

With this year’s World Password Day upon us, it’s high time to take a good look at the critical infrastructure sector and the password-related security vulnerabilities that are in dire need of an update. While modern utility systems become increasingl… Continue reading Passwords a Threat to Public Infrastructure

Breach Clarity Weekly Data Breach Report: Week of May 3

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Weekly Data Breach Report: Week of May 3

The New Wave of Cybersecurity Awareness Training

The only constant is change. The ongoing effects of COVID-19 have taught us that change is inevitable to survive. One major area that has been affected during COVID-19 is how we interact with employees, and what we need those employees to know right n… Continue reading The New Wave of Cybersecurity Awareness Training

Why Financial Services Needs Network Transformation

All business industries have seen increasing pressure to digitize their services in recent years, particularly over the past 12 months in response to COVID-19. But few industries have felt this pressure more than the financial sector, where customers … Continue reading Why Financial Services Needs Network Transformation

Securing Health Care Transformation

The recent explosion of telemedicine and patient portals signals that the healthcare industry has begun to truly prioritize digital-first business models for patient and clinical interactions. One AmWell study found that in 2020, 80% of physicians rep… Continue reading Securing Health Care Transformation

What’s Next for Connected Devices in Health Care?

According to a Deloitte study, approximately 68% of medical devices will be either connected or connectable to a health system network by 2025. Each of those devices simultaneously represents an opportunity for health care providers to transform the d… Continue reading What’s Next for Connected Devices in Health Care?

Zero-Trust at Home: No-Exception Remote Work

The zero-trust approach has long been a popular strategy for organizations looking for airtight security in the workplace. By consistently questioning who a user is and what they want to do, we expel a potentially harmful blind trust; assumptions go o… Continue reading Zero-Trust at Home: No-Exception Remote Work