Data Protection November 9, 2021 Designing a BYOD Approach for the Future 4 min read - Bring-your-own-device (BYOD) policies were some of the many things that changed when the COVID-19 pandemic hit. A study from Palo Alto Networks by ONR found 60% of companies expanded their BYOD policies to help employees manage the shift to remote…
Fraud Protection August 11, 2021 Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient 3 min read - When did you last change your work password? Was it when the system prompted you? When you were first hired? Or maybe the answer doesn’t matter. When it comes to password safety, old adages don’t always apply anymore. Let’s take…
CISO December 17, 2018 How to Check for Blind Spots in Your Security Program 3 min read - An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.
Data Protection October 17, 2018 Is Employee Negligence Threatening Your Information Security? 3 min read - With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.
Intelligence & Analytics August 24, 2017 Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks 3 min read - By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Software Vulnerabilities October 4, 2013 Massive Adobe Breach Puts Organizations at Risk of Zero-Day Exploits 2 min read - Customers are at significant risk due to a recently reported Adobe breach.