Our Blog
CyberArk Labs: Evolution of Credential Theft Techniques
In the past year, organizations continued to struggle to address cyber security risks created in…
5 minutes read
CyberArk. Using Azure, AWS or Google? Protect Privileged Accounts in the Cloud
CyberArk enables organizations to protect cloud assets by providing powerful solutions for securing privileged accounts…
2 minutes read
Boldon James. Seven reasons to classify your data
The best way to protect and govern your data is to let it tell your…
6 minutes read
CyberArk. Security is a commercial reality
With high profile breach revelations seemingly part of the weekly news cycle and hard-hitting legislation…
3 minutes read
CyberArk. Countdown to GDPR: Responding to the 72-hour Notification of a Personal Breach
Here’s a million dollar question (which could quite literally be a million dollar question, given…
6 minutes read
SophosLabs: a look at 5 Ransomware as a Service (Raas) kits
In the past year, SophosLabs has tracked the steady proliferation of ransomware kits, which people…
2 minutes read
Sophos. The problem with firewalls
There’s an evolution underway in firewalls that’s different from any previous generation. Shifts in the…
6 minutes read
GlobalSign. Six Ways GDPR Will Affect HR
In May 2018, the EU will introduce a new set of data rules known as…
7 minutes read
Gartner acknowledges Sophos’ continued data protection leadership, again
After being recognized by Gartner as a leader in seven consecutive Magic Quadrants for Mobile…
2 minutes read
Trustwave. Can Your Cloud Security Be Too Smart?
Many companies are transitioning to the cloud. Cloud services offer highly available, cost-effective and flexible…
3 minutes read