Our Blog
Boldon James. The 5 Steps to Effective Data Classification: Identify
Using data classification as part of a strategy to secure corporate data assets is sometimes…
3 minutes read
Boldon James. Most Consumers Still Don’t Know How Brands Are Using Their Data
Despite the past year’s global focus on GDPR and other data privacy regulations designed to give consumers…
4 minutes read
Sophos. Would you fall for a BEC attack?
Earlier this year the North Carolina county of Cabarrus in the U.S.A. was hit by…
3 minutes read
Sophos. The security of machine learning
Artificial intelligence and machine learning are persistently in the headlines with rich debate over its…
6 minutes read
CyberArk Docs: Privileged Access Security Documentation for All
Not long ago on the CyberArk Conjur blog, our DevOps community manager and evangelist John…
3 minutes read
Sophos. 3 reasons attackers love your servers
37% of cyberattacks are discovered on servers, making them the most likely place to identify…
3 minutes read
CyberArk. Where Security Accountability Stops and Starts in the Public Cloud
For years, security was cited as a prime reason not to put sensitive data or…
3 minutes read
CyberArk. Privileged Access Key to China’s Attack on Telecoms
The recent attack by China on Cellular companies – called Operation Soft Cell – is…
4 minutes read
Sophos. 5 ways to avoid a GDPR fine
In the last week both British Airways (BA) and Marriott Hotels have hit the headlines…
4 minutes read
Sophos. 7 best practices for securing the public cloud
Given the simplicity and cost-effectiveness of the public cloud, it’s no surprise that more and…
5 minutes read