LegalSec: Why Data Discovery is the Bedrock of Data Protection

LegalSec: Why Data Discovery is the Bedrock of Data Protection

| | Data Discovery
The public nature of the legal system means that law firms are particularly vulnerable to cybersecurity risks like data leaks and ransomware, making legal security (legalsec) critical for businesses in the law industry ... Read More
Insider Series: Law Firms and Cybersecurity – What’s Changed?

Insider Series: Law Firms and Cybersecurity – What’s Changed?

The public nature of the legal system makes law firms particularly vulnerable to a growing number of cybersecurity risks. Law firms have unique access to highly confidential client information and as a result, face a growing number of federal, regional and industry data protection and privacy requirements ... Read More
Insider Series: Managing Supply Chain Security Risks

Insider Series: Managing Supply Chain Security Risks

Whether we’re talking about mechanical components, or accounting software, countless businesses around the world make up the complex supply chains that keep our business’s lights on. As a business leader focused on zero trust strategy, it’s important to hold your vendors accountable to the same level of data protection and ... Read More
Top 8 Best Practices for Your Organization's Data Security

Top 8 Best Practices for Your Organization’s Data Security

|
Here's a list of the top eight data security best practices to help your organization mitigate cybersecurity risk and better meet compliance requirements ... Read More
What are the Consequences of Non-Compliance With Data Privacy Laws?

What are the Consequences of Non-Compliance With Data Privacy Laws?

The emergence of data privacy laws has prioritized how organizations collect, store and use consumer information - commonly referred to as personally identifiable information (PII).  ... Read More
Insider Series: How Risk Management Committees Can Support Compliance and Insurance Requirements

Insider Series: How Risk Management Committees Can Support Compliance and Insurance Requirements

Drivers like compliance and cyber liability are influencing the way companies think about risk management, and their reliance on trusted partners like MSPs to help them manage it. In this episode of the Insider Series I sat down with Ben Tercha, VP of Operations at Omega Systems to dig into ... Read More
Insider Series: How shifting regulatory demands and the evolving threat landscape are changing risk management

Insider Series: How shifting regulatory demands and the evolving threat landscape are changing risk management

Whether you’re handling it in-house or outsourcing it to a managed service provider (MSP), risk management is no easy feat. Ever-increasing regulatory requirements and the shifting threat landscape mean the very definition of risk management changes constantly, too. In this episode of the Insider Series I sat down with Vinod ... Read More
Data Loss Prevention (DLP) Controls, Technology and Strategy

Data Loss Prevention (DLP) Controls, Technology and Strategy

|
Demystifying small and midsized enterprise data loss prevention (DLP) and its two parallel streams: DLP technology and DLP strategy ... Read More
Using Data Discovery and Classification to Establish Security Outcomes

Using Data Discovery and Classification to Establish Security Outcomes

And the real-life challenges midsized enterprises are juggling as they scale to achieve them ... Read More
Log4j Zero-day Vulnerability: What You Need to Know

Log4j Zero-day Vulnerability: What You Need to Know

| | Cybersecurity, zero trust
By now nearly everyone has heard about Log4j or  CVE-2021-44228, a Java vulnerability disclosed late last week. The vulnerability impacts Java and more specifically, the library Java uses to log application error messages. Researchers have rated the vulnerability a 10/10 in terms of severity, and for good reason. Hundreds of millions of devices and applications run Java, which ... Read More