How Should Organizations Tackle Their Data Privacy Requirements?

Data is among the most valuable assets that need to be safeguarded at all costs. But in the digitally-driven business world, cybercrimes are prevalent, making data protection and data privacy a main ...
The biggest cyber threats among European CSPs

The biggest cyber threats among European CSPs

In the second half of 2021, adware exploded. This is explored in depth in the Allot H2 2021 Cyber Threat Report. The report found that, during the second half of 2021, Allot ...

Cybersecurity in 2022 and Beyond

It’s that time of year that the usual happens. Christmas crackers with bad jokes. Holiday specials on TV (constantly). And cyber specialists like me make predictions about the year to come. With ...

8 Best Practices for Data Security in Hybrid Environments

Operating in hybrid environments can get really tricky at times. As more and more organizations are moving their sensitive data to the public cloud, the need to keep this data secure and ...

CIS Control 11: Data Recovery

Data loss can be a consequence of a variety of factors from malicious ransomware to hardware failures and even natural disasters. Regardless of the reason for data loss, we need to be ...
HIPAA Compliance for Healthcare Apps

HIPAA Compliance for Healthcare Apps

What Application Developers Need to Know About HIPAA CompliancePhoto by Alexander Sinn on UnsplashIncreasingly, patients want to access their healthcare information using mobile applications or web applications. Instead of calling a doctor’s office, ...

CIS Control 3: Data Protection

For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it ...

Spot the Ball & Security Detection Games

When I was younger, and printed newspapers were a more common household purchase, I remember fondly watching my mother play a game called “Spot the Ball.” For those of you not familiar ...

Impact of GDPR on Cloud Service Providers

Cloud computing is an integral part of most businesses globally. Technology has transformed the way businesses operate and thrive in the industry. However, the cloud industry has been facing huge challenges when it ...
organization, zero-trust, trust supply chain third-party

Enterprises Misplace Trust in Partners, Suppliers

In an era when many organizations are focused on building zero-trust access control architectures, many are paradoxically extending considerable trust to the third parties they enable to access their systems remotely. And ...
Security Boulevard