The 5 Most Cringe-Worthy Privileged Data Breaches of 2018

The 5 Most Cringe-Worthy Privileged Data Breaches of 2018

Privileged attack vectors and stolen personally identifiable information (PII) obtained have been a constantly paired news item throughout 2018. In 2019, expect privileged attack vectors to continue to reign as the number one root cause of breaches for both consumer...
GDPR 101 – your essential compliance starting point

GDPR 101 – your essential compliance starting point

Have you started preparing for GDPR compliance? If not, it’s time to get up to speed on what you need to do. Otherwise you expose your organization to a potentially significant financial penalty. The General Data Protection Regulation is the EU’s new law designed to...
500 million customer details hacked

500 million customer details hacked

International hotel chain Marriott said the details of 500 million hotel guests has been stolen in a sweeping hack. The breach happened in 2014, but Marriott didn’t become aware of it until September this year. The hackers, or hacker, copied and encrypted...
Software License Optimization Buy Only the Software You Need; Use All of the Software You Have-Get ready for the next evolution of digital business technology

Software License Optimization Buy Only the Software You Need; Use All of the Software You Have-Get ready for the next evolution of digital business technology

On-premise applications are moving to the cloud. Software-as-a-Service (SaaS) is becoming the first choice for new technology deployments. The future holds an explosion of IoT devices that will generate greater amounts of data at even faster speeds. And then there are...