The Hidden Costs of Insider Threats

Much of cybersecurity policy and practice is dedicated to protecting against external threats and attacks that put networks, data, and devices at risk. Malicious incidents of hacking, phishing, and the like from ...

The Document Security Problem that the Trump and Biden Scandals Aren’t Focused On

Security is a state of mind and apparently that state of mind isn’t very prevalent in the U.S. Government, nor is it that common in business. Back when I was an Internal ...
5 Things Every Organization Should Consider When It Comes to Cybersecurity Awareness Training

5 Things Every Organization Should Consider When It Comes to Cybersecurity Awareness Training

Your organization is assessing budgets, and security is high on the list. You’ve hired top talent for your DevSecOps team, and generally speaking, your tech landscape has security in mind. That’s a ...

2021 Cybersecurity Predictions

2020 has made cybersecurity among the priorities of most organizations. The challenging times brought by the COVID pandemic showed that no corporation is immune to cyber attacks. Even the largest and seemingly ...

COVID-19 Pandemic Shapes and Accelerates the Future of Work

When 2020 began, many companies were engaged in or at least considering digital transformation. The COVID-19 pandemic and overnight shift to entire organizations working remotely from home as we struggle to contain ...

Remote Workers Don’t Have to Be Insecure Workers

These are unprecedented times. As countries around the world struggle to contain and respond to the COVID-19 pandemic, businesses of all sizes and across all industries find themselves suddenly trying to maintain ...

An Unexpected Insider Threat: Senior Executives Who Ignore Cybersecurity Rules

Cybersecurity should be a top concern for any business, with strong policies and protocol put in place, and top executives leading by example. However, recent research has shown that more than half ...

Security First: The Double-Edged Sword of Remote Collaboration

For the better part of the past decade, online tech support scams have been on the rise as hackers find new ways to trick consumers into providing remote access to their computers ...
A No-Compromise Approach to Your Cloud-Based Intranet Security

A No-Compromise Approach to Your Cloud-Based Intranet Security

It’s a well-established fact that companies prefer cloud solutions to on-premises ones when it comes to practically any software. It’s estimated that over 80% of all enterprise workloads will be in the ...

WhatsApp Vulnerability Illustrates Importance of Data Protection

Technology provides a wide variety of benefits, but many come with caveats or pitfalls as well. When it comes to communication, technology enables us to engage with just about anyone, anywhere in ...

Secure Guardrails