Data Security
Canada’s New Data Privacy Bill: the Digital Charter Information Act
On November 17, the Canadian government introduced Bill C-11, better known as the Digital Charter Implementation Act, which will see the North American country make amendments to its data privacy policies. It ...
Email Attackers Using Auto-Forwarding Rules to Perpetrate BEC Scams
U.S. law enforcement learned that email attackers are using auto-forwarding rules to help them to perpetrate Business Email Compromise (BEC) scams. In a Private Industry Notification published on November 25, the FBI ...
What Happens to Your Personal Data after Deleting an App
Over the last decade or so, apps have become a familiar and comfortable aspect of our everyday lives. We download them to our smartphones and tablet devices and swap them out whenever ...
Back-to-Work Phishing Campaign Targeting Corporate Email Accounts
A phishing campaign used what appeared to be back-to-work notifications in order to compromise recipients’ corporate email accounts. Near the end of November, Abnormal Security detected one of the campaign’s attack emails ...
Virtual Hackathon Generates Next Generation of Imperva Innovation
“How do we run a global hackathon amid a global pandemic?” That was my first thought when I began planning the 2020 Imperva Hackathon earlier this year. While the event is designed ...
Data Backup and Recovery Strategies during Work from Home
5 All-Important Data Backup Strategies You Need to Work from Home With everything moving online at an unprecedented pace in the wake of COVID-19, working from home has become the new normal ...
Emerging Public Cloud Security Challenges in 2020 and Beyond
According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end of this year, up from $USD 227.8 billion just a year ago ...
Google Finally Pulls Chinese Apps Stealing Personal Data
After six million downloads, two spyware Baidu apps have been removed from the Play Store. What took Google so long? ...
Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]
With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA ...
DevSecOps: 4 Reasons You Need One
Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining ...

