Keeping Source Code Safe with Data Loss Prevention

Keeping Source Code Safe with Data Loss Prevention

When developing new software and algorithms, companies’ number one concern is that they do the job they are meant to do and function efficiently. Cybersecurity features, when implemented, are meant to ensure the protection of users’ data and guard against malicious...
Black Friday, Cyber Monday… tips, tricks and things to look out for

Black Friday, Cyber Monday… tips, tricks and things to look out for

Black Friday is firmly entrenched in the minds of many people following televised scenes and newspaper reports of people trampling over each other, general hysteria and hyped up shoppers trading blows in their bid to grab the best bargains. And it’s coming again, with...
A Slicker, Easier Way to Use EasyLock

A Slicker, Easier Way to Use EasyLock

Data has never been more vulnerable than it is today. Companies struggle to keep their data secure as relentless waves of attacks strike at the core of some of the world’s most established brands and trusted online services. Added pressure comes from the adoption of...
Fraud Android apps claim to generate cryptocurrencies

Fraud Android apps claim to generate cryptocurrencies

Who wouldn’t like their own private goldmine? You dig when you feel like it and occasionally pull out a sizable nugget. Fake Android apps are offering a similar deal. It’s not an exact parallel but the apps claim to mine for cryptocurrencies. It’s a strong hook for...
How to Prepare your Data at Rest for GDPR Compliance

How to Prepare your Data at Rest for GDPR Compliance

With the GDPR implementation around the corner, companies processing EU data subjects’ personal information need to step up their data protection policies and take decisive action to reach compliance. Under the new legislation, organizations will no longer have the...
Five Secrets of Enterprise Password Management

Five Secrets of Enterprise Password Management

Despite the billions of dollars spent every year on IT security products, countless organizations still fail at basic cybersecurity tasks. One of the most commonly overlooked cybersecurity fundamentals is enterprise password management. Too many companies don’t...