breach

Companies Ignoring Third-Party Breach Alerts

What would you do if you found out through a third party that your organization had been breached and the information was discovered for sale on the dark web? The correct response ...
Security Boulevard

How AI Can Help You Stay CCPA Compliant

Consider investing in emerging tech tools that can add a deeper layer of data privacy protection. Artificial intelligence technology, in particular, holds a great deal of promise when it comes to complying ...
JavaScript: How NPM Maintainer Accounts Amplify Risk

JavaScript: How NPM Maintainer Accounts Amplify Risk

Attackers need to target only 20 specific maintainer accounts to reach more than half of the entire JavaScript npm ecosystem, security researchers warn. What's the cybersecurity impact for the digital supply chain? ...

Top 5 Cybersecurity Trends to Prepare for in 2020

I don’t need a crystal ball to predict that in 2020 cybersecurity attacks will accelerate and the tactics will evolve. We’ll continue to be hounded by greater volumes of the attacks that ...
A depiction of compliance and legal requirements expected of SharePoint backup and recovery including backup data center locations, backup retention options, granular backup controls, and security standards.

Why Granular SharePoint Backup and Recovery is Important

Selective, granular SharePoint backup and recovery can help organizations to meet security standards, comply with industry regulations, and reduce liabilities. Learn why a blanket backup solution is not always the best option ...
data security

Predictions 2020: Data Security Next Year and Beyond

As the oft-used metaphor goes, data is the new oil that powers business success. Today’s modern organizations are built on data collection so they can store and analyze it for insights. Unless ...
Security Boulevard
Bitglass Security Spotlight: Domains Used to Target Microsoft Users

Bitglass Security Spotlight: Domains Used to Target Microsoft Users

Here are the top stories of recent weeks: Phishing Campaign Targets Office 365 Admins T-Mobile wireless customers' private data compromised in recent security breach Total of 1.2 Billion Records in a Single ...
cybersecurity

Privacy Regs Changing the Face of Cybersecurity

Companies must take a different cybersecurity tack to ensure ongoing compliance with global regulations regarding privacy The regulatory climate around the world is changing rapidly. Scores of new regulations, including the General ...
Security Boulevard
end-of-life

End-of-Life Devices Pose Data Breach Risk

End-of-life devices not properly sanitized of data can cause compliance issues and make corporate data vulnerable GDPR, CCPA and the rest of the alphabet soup of privacy laws should have organizations looking ...
Security Boulevard
privacy

Privacy: Where Security and Ethics Miss the Mark

Privacy. We all know what it is, but in today’s fully connected society can anyone actually have it? For many years, it seemed the answer was no. We didn’t care about privacy ...
Security Boulevard
Loading...