NSA Provides Direction on Eliminating Obsolete Encryption Protocols
Eliminating old, out-of-date encryption protocols can protect sensitive and valuable data from being accessed by adversaries, the NSA reiterated this week.
NIST Issues PACS Guidance for Healthcare Delivery Organizations
NIST's latest guidance is geared towards preventing healthcare organizations that oversee PACS software from exposing patient data.
What is a Data Governance Model?
Learn about data governance and data governance models, the key elements usually covered by policies, benefits, risks, and best practices.
Why Your Organization's Security Maturity Matters – And What to Do About It
Forrester’s practical and actionable Informational Security Maturity Model - and Digital Guardian - can help organizations gauge their information security program.
What is NIST CSF?
The National Institute of Standards and Technology's Cybersecurity Framework is designed to help organizations manage their security risk; in this blog we'll go over its requirements, penalties for failing to comply with it, and best practices.
What is Security Orchestration?
Learn more about security orchestration, including how it works, the benefits, and how employing security orchestration tools can increase your organization's efficiency.
What's the Most Important Thing to Keep in Mind About MDR Costs?
In our latest group interview, we asked 21 experts and business leaders what they think the most important thing for companies to keep in mind about managed detection and response costs is.
DoppelPaymer Ransomware Gang Threatening Victims
In a recent FBI note the agency outlined how DoppelPaymer ransomware attacks have impacted critical infrastructure - and the lengths the attackers have gone to get paid.
Additional CCPA Regulations Proposed by California AG
The potential updates to the data privacy law build off of others proposed in October.
What is Data Security?
Learn about data security and the role it plays in many data protection solutions in Data Protection 101, our series on the fundamentals of data security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.