Boldon James. The 5 Steps to Effective Data Classification: Identify

Using data classification as part of a strategy to secure corporate data assets is sometimes…

Published August 21, 2019
3 minutes read

Boldon James. Most Consumers Still Don’t Know How Brands Are Using Their Data

Despite the past year’s global focus on GDPR and other data privacy regulations designed to give consumers…

Published August 12, 2019
4 minutes read

Sophos. Would you fall for a BEC attack?

Earlier this year the North Carolina county of Cabarrus in the U.S.A. was hit by…

Published August 12, 2019
3 minutes read

Sophos. The security of machine learning

Artificial intelligence and machine learning are persistently in the headlines with rich debate over its…

Published August 12, 2019
6 minutes read

CyberArk Docs: Privileged Access Security Documentation for All

Not long ago on the CyberArk Conjur blog, our DevOps community manager and evangelist John…

Published July 31, 2019
3 minutes read

Sophos. 3 reasons attackers love your servers

37% of cyberattacks are discovered on servers, making them the most likely place to identify…

Published July 29, 2019
3 minutes read

CyberArk. Where Security Accountability Stops and Starts in the Public Cloud

For years, security was cited as a prime reason not to put sensitive data or…

Published July 27, 2019
3 minutes read

CyberArk. Privileged Access Key to China’s Attack on Telecoms

The recent attack by China on Cellular companies – called Operation Soft Cell – is…

Published July 23, 2019
4 minutes read

Sophos. 5 ways to avoid a GDPR fine

In the last week both British Airways (BA) and Marriott Hotels have hit the headlines…

Published July 17, 2019
4 minutes read

Sophos. 7 best practices for securing the public cloud

Given the simplicity and cost-effectiveness of the public cloud, it’s no surprise that more and…

Published July 17, 2019
5 minutes read