5 Steps to Effective CUI Classification

Prior to the U.S. government’s National Archives and Records Administration’s (NARA) implementation of the Controlled Unclassified Information (CUI) protection framework, government agencies employed ad hoc agency-specific policies, procedures and mar… Continue reading 5 Steps to Effective CUI Classification

Breach Clarity Weekly Data Breach Report: Week of June 7

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Weekly Data Breach Report: Week of June 7

With Remote Work, Don’t Leave Security Behind

We’ve all heard how the global pandemic has accelerated workplace trends that were already well underway. Adoption of automation, e-commerce, and remote work has increased significantly, and many of the changes are here to stay. For example, many orga… Continue reading With Remote Work, Don’t Leave Security Behind

Best Practices for Ransomware Defense

Ransomware has the potential to destroy business data, cause millions of dollars in revenue loss, ruin your business’ reputation and sully your brand. Such an attack erodes trust, and customers will leave en masse. Investing in security may seem… Continue reading Best Practices for Ransomware Defense

SaaS to PaaS: The Best Kind of Platform Shift

For cloud security specialists, these are strange times, indeed. On one hand, software-as-a-service (SaaS) providers with a focus on security are tearing up the transaction market. The most recent one is described as the largest private equity deal in… Continue reading SaaS to PaaS: The Best Kind of Platform Shift

How to Address the Cybersecurity Talent Gap

The talent shortage in cybersecurity is real. The most recent (ISC)² Cybersecurity Workforce Study puts the global cybersecurity talent shortage at more than 4 million people. Let that number sink in—4 million people. As expected, the fact that a larg… Continue reading How to Address the Cybersecurity Talent Gap

Proliferation of DevOps Tools Introduces Risk

One of the main contributors to the weak security posture of development environments is the complexity and knowledge gap created by the number of tools and services involved in this process. With more than a hundred CI/CD tools to choose from and hun… Continue reading Proliferation of DevOps Tools Introduces Risk

Three Things Holding Back Cloud Security

A recent PwC report found that a staggering 96% of executives are shifting their cybersecurity strategies due to COVID-19. While the majority of these changes are likely long overdue, the transition to the cloud isn’t a simple “lift and shift&#8… Continue reading Three Things Holding Back Cloud Security

Five Most Common Cloud Threats

Cloud threats are on the rise. At any point in time, sensitive data can move between 2,481 different cloud apps and services, making it a prime target for cybercriminals. A recent study by McAfee concluded that there’s been a 630% rise in cyberattacks… Continue reading Five Most Common Cloud Threats

Trojan Horse? Here Comes the Trojan Home

How many homeowners do you know who are Wi-Fi network specialists? Unless they work in technology, I’m willing to bet that your average apartment or condo complex contains very few experts. So when it comes to cybersecurity, very few residents will th… Continue reading Trojan Horse? Here Comes the Trojan Home