Search Results for: data protection strategies Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign... Blog Post Ransomware Attack on Toronto Transit Commission December 6, 2021 On October 29, 2021, the Toronto Transit Commission (TTC) acknowledged that it became the victim of a sophisticated ransomware attack.... Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,... Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday.... Knowledge Center Cybersecurity Exercises Whitepaper November 3, 2020 Conducting Cybersecurity Exercises According to International Standard ISO 22398 Exercises and simulation activities have been around for decades, if not... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign...
Blog Post Ransomware Attack on Toronto Transit Commission December 6, 2021 On October 29, 2021, the Toronto Transit Commission (TTC) acknowledged that it became the victim of a sophisticated ransomware attack....
Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow....
Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,...
Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape...
Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday....
Knowledge Center Cybersecurity Exercises Whitepaper November 3, 2020 Conducting Cybersecurity Exercises According to International Standard ISO 22398 Exercises and simulation activities have been around for decades, if not...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...