CyberArk Labs: Evolution of Credential Theft Techniques

In the past year, organizations continued to struggle to address cyber security risks created in…

Published January 24, 2018
5 minutes read

CyberArk. Using Azure, AWS or Google? Protect Privileged Accounts in the Cloud

CyberArk enables organizations to protect cloud assets by providing powerful solutions for securing privileged accounts…

Published January 23, 2018
2 minutes read

Boldon James. Seven reasons to classify your data

The best way to protect and govern your data is to let it tell your…

Published January 23, 2018
6 minutes read

CyberArk. Security is a commercial reality

With high profile breach revelations seemingly part of the weekly news cycle and hard-hitting legislation…

Published January 10, 2018
3 minutes read

CyberArk. Countdown to GDPR: Responding to the 72-hour Notification of a Personal Breach

Here’s a million dollar question (which could quite literally be a million dollar question, given…

Published December 31, 2017
6 minutes read

SophosLabs: a look at 5 Ransomware as a Service (Raas) kits

In the past year, SophosLabs has tracked the steady proliferation of ransomware kits, which people…

Published December 31, 2017
2 minutes read

Sophos. The problem with firewalls

There’s an evolution underway in firewalls that’s different from any previous generation. Shifts in the…

Published December 31, 2017
6 minutes read

GlobalSign. Six Ways GDPR Will Affect HR

In May 2018, the EU will introduce a new set of data rules known as…

Published December 15, 2017
7 minutes read

Gartner acknowledges Sophos’ continued data protection leadership, again

After being recognized by Gartner as a leader in seven consecutive Magic Quadrants for Mobile…

Published December 15, 2017
2 minutes read

Trustwave. Can Your Cloud Security Be Too Smart?

Many companies are transitioning to the cloud. Cloud services offer highly available, cost-effective and flexible…

Published December 15, 2017
3 minutes read