What to Know about APIs, the “On-Ramps to the Digital World”

An application programming interface, or API, is a defined process that allows data to be shared between applications or programs. Each API consists of a set of rules that dictates how communication ...

UK Construction: Cybersecurity Experts Defend Joint Ventures

After years of falling behind, the construction industry has realised the importance of its data. Construction-related businesses invested a remarkable 188% more in cybersecurity in 2018–19. Data leaks and cyberattacks have jolted ...
Insider Series: Law Firms and Cybersecurity – What’s Changed?

Insider Series: Law Firms and Cybersecurity – What’s Changed?

The public nature of the legal system makes law firms particularly vulnerable to a growing number of cybersecurity risks. Law firms have unique access to highly confidential client information and as a ...

Reexamining the “5 Laws of Cybersecurity”

Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome ...

Prioritizing Cybersecurity Throughout All Web Development Sprints

No one doubts the importance of cybersecurity in web development — and yet, often in the development cycle, we neglect to prioritize it across each sprint and into the final product. Making ...
Using Data Discovery and Classification to Establish Security Outcomes

Using Data Discovery and Classification to Establish Security Outcomes

And the real-life challenges midsized enterprises are juggling as they scale to achieve them ...
How to Become a CMMC Certified Supplier – and Why Certification Matters

How to Become a CMMC Certified Supplier – and Why Certification Matters

If you do business with or supply the U.S. Department of Defense (DoD) – or have plans to – you must be CMMC certified. The Cybersecurity Maturity Model Certification (CMMC) framework exists to protect ...
2022 IT security predictions - and the (non-surprising) links between them

2022 IT security predictions – and the (non-surprising) links between them

The last 24 months have been unpredictable to say the least. But even in an era of unpredictability patterns serve as future predictors. Full disclosure: I don't have a crystal ball (though ...
Industry Spotlight: How to Support and Protect Digital City Rollout Efforts with Data Discovery

Industry Spotlight: How to Support and Protect Digital City Rollout Efforts with Data Discovery

Whether you’re a utility or municipality servicing a small rural region, or a large city with millions of customers, you’ve got lots of sensitive, unstructured data across multiple file shares. Growing data ...

Cloud Compliance Best Practices: A Quick Overview

Cloud compliance is more important than ever, especially as businesses and organizations continue to engage in remote and digital work practices due to COVID-19. Even before the pandemic, more and more companies ...