What is Data Breach or Cyber Security Insurance?
Learn about what a data breach insurance policy is, what one covers, and whether one may be right for your organization, in this week's Data Protection 101.
Facebook and the Attribution Conundrum
Facebook this week said it removed a series of pages believed to be involved in a deceptive political influence campaign.
What is NIST SP 800-171?
Learn about NIST SP 800-171, a set of guidelines designed to ensure federal data remains confidential when shared in nonfederal systems, what it covers, requirements, and more, in this week's Data Protection 101.
SaaS: Single Tenant vs Multi-Tenant - What's the Difference?
What are the advantages of a multi-tenancy SaaS architecture? How does it differ from single tenant instances? We break down the differences and highlight the benefits of implementing a SaaS solution for data protection in this blog.
The ‘Not Secure’ Web
After years of hinting it would do so, Google finally began marking HTTP pages that collect information as "Not Secure" in Chrome this week.
Understanding the Financial Industry Regulatory Authority (FINRA) and FINRA Rules
Learn about the Financial Industry Regulatory Authority, or FINRA, its function, and the scope of its rules, in this week's Data Protection 101, our series on the fundamentals of information security.
FDA Urges Data Security, Controls When Using EHR in Clinical Trials
The Food and Drug Administration issued new guidance on electronic health record data security this week that encourages employing privacy and security controls when performing clinical trials.
Top 3 Considerations When Moving to a Cloud-Based Security Platform
21 cloud security pros share their recommendations for organizations looking to move to a cloud-based security platform.
Phishing Attacks at Hospice Expose PHI, PII
A hospice in Tennessee didn't realize until months after suffering a phishing attack that it may have resulted in the access of sensitive protected health information.
Mobile Attack Campaign Used MDM to Intercept Traffic
Researchers recently discovered a narrowly focused attack that targets iPhone users with data-stealing, location tracking malware.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.