Resources

Friday Five: The Next Wave of Regulatory Compliance, Election Scams, & More

CISA Sees Elimination of 'Bad Practices' as Next Secure-by-Design Step by Matt BrackenThe Cybersecurity and Infrastructure Security Agency (CISA) has made significant strides in its secure-by-design initiative, gaining 230 software vendors' commitments to strengthen security features like multi-factor authentication and reducing default passwords. By shifting security responsibilities to software...

Friday Five: Real-Life Cyber Consequences, New Ransomware Stats, & More

As ransomware operators continue to expand the impact of their malware, CISA is proposing new requirements to help protect sensitive data, while the SEC is coming down on organizations that downplayed a historical breach. Learn all about these stories and more in this week's Friday Five.CISA Proposes New Security Requirements to Protect GOVT, Personal Data by BILL TOULASCISA has proposed security...
Blog

Understanding the Zero Trust Security Model to Safeguard Digital Infrastructure

What Is Zero Trust?Zero Trust is a cybersecurity model that requires verification of all internal and external access attempts, eliminating trust to prevent breaches. Originated by Forrester Research, Zero Trust mandates a policy of least privilege and strict identity verification for every person and device trying to access information on a private network, regardless of whether they are inside...
Datasheet

Digital Guardian Secure Service Edge

As the workforce becomes more decentralized, with work-from-home and hybrid schedules becoming the norm, the need for cloud and SaaS applications has grown more than expected pre-pandemic. As traditional office networks are depreciated, security teams are required to secure access to and retain control of sensitive data for any employee using cloud apps – which essentially is everyone. At the same...
Blog

Secure Access Service Edge (SASE): Moving Beyond Traditional IT Architecture

Learn about Secure Access Service Edge (SASE), its components, and how it enhances network security and performance in a cloud-based service in this week's blog.An increasingly remote workforce and edge computing applications have heightened the need to fortify perimeter-based defenses and build device trust. A prime solution for this challenge is the Secure Access Service Edge (SASE)...
Blog

Friday Five: The Vulnerable Healthcare Industry, Workplace Cyber Threats, & More

HEALTHCARE'S GRIM CYBER PROGNOSIS REQUIRES SECURITY BOOSTER BY ROBERT LEMOSThe healthcare sector is increasingly vulnerable to cyberattacks, particularly ransomware, with 66% of organizations experiencing attacks in the past year, up from 60%. Emerging threats like the Trinity ransomware group are raising alarms, with cyberattacks like theirs disrupting services, exposing sensitive patient data,...

Protecting Pokemon's Most Critical IP

Collaboration is essential to Pokemon’s business, as sharing rich media files like game designs and new character ideas requires collaboration, editing, and a long production process. As a result, data exists everywhere: between partners, across teams, and all around the world. Learn from John Visneski, former Director of Information Security & DPO at The Pokemon Company International, about how...
Blog

XDR vs EDR: What You Need to Know

XDR and EDR solutions can help secure your corporate ecosystem from cyber threats, especially with the increasing number of remote workers. Read this blog to learn the differences between the technologies, how they work, and how to choose between the two.Cybersecurity solutions must optimize limited resources against an ever-evolving threat landscape. Choosing between EDR (endpoint detection and...
Blog

Friday Five: Threat Actors and Law Enforcement Throwing Punches, Vulnerability Concerns, & More

As ransomware gangs and state-sponsored threat actors wage war against international law enforcement, private organizations, U.S. courts and agencies, and the manufacturing industry are urged to reinforce their cybersecurity measures. Learn all you need to know about these emerging threats in this week's Friday Five.SYSTEMS USED BY COURTS AND GOVERNMENTS ACROSS THE US RIDDLED WITH VULNERABILITIES...
Guide

CISO’s Guide to Enterprise Security Migration

Security solutions need to work for both your business and your employees. But if you find that your solutions interrupt workflows or aren't adequately protecting your data, making timely and efficient changes before a security incident occurs is crucial. Read this eBook for tips on navigating the migration process without compromising security.
Resource

Zero Trust File Transfer

The ProblemFor many organizations, security methods like PGP encryption are not enough because once files are downloaded and unencrypted, those files can still be shared with unauthorized recipients. They need a way to apply Zero Trust tenants to their file transfers.Another common limitation is not being able to send large files securely and efficiently with external parties – a critical...
Blog

Understanding Saudi Arabia's NDMO Standards

As governments continue to find themselves switching fully to digital records, it's important to ensure there are safeguards in place to secure that data. In the Middle East, the Kingdom of Saudi Arabia’s (KSA’s) National Data Management and Personal Data Protection Standards are designed to do just that, implementing cybersecurity practices that will safeguard public and government-owned data as...