Cybersecurity Blog

Featured Post

Five Critical Capabilities You Need to Stop Ransomware Attacks

A closer look at ransomware: what is it, why is it so devastating, and why aren’t we doing a better job at preventing it? This blog also describes an innovative new cybersecurity solution and shows how it can detect and prevent ransomware, malware, and other intrusions—before they can do damage.


( read )

Tags: cyber attack, cybersecurity, data protection,

Update on the California Consumer Protection Act

The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. While no companies have failed to comply...


( read )

Tags: data breach, gdpr, cybersecurity,

A Sad Outcome of the Coronavirus: Cyber-attackers Exploiting the Situation

It didn’t take very long for hackers and cyber-attackers to take advantage of the confusion and stresses of COVID-19 felt by...


( read )

Tags: cybersecurity, ransomware, data protection,

What is Encryption Key Management and KMS Implementation?
To provide effective data protection and application defense and remain in compliance, organizations today need to protect...

( read )

Tags: data breach, cybersecurity, data protection

What is the Canada Data Breach Notification Law?
Canada recently created a new data breach notification law, one that requires businesses to record all breach information and...

( read )

Tags: data breach, cybersecurity, intrusion response,

Why Secure DevOps Methodology Needs A Whole Brain Approach
0
Share!
 
 
 

( read )

Tags: cyber attack, secdevops, cybersecurity,

5 Tips for Implementing DevOps Application Security
0
Share!
 
 
 

( read )

Tags: data breach, secdevops, cybersecurity,

Why DevOps Application Development Needs to Evolve
0
Share!
 
 
 

( read )

Tags: secdevops, cybersecurity, data protection