Reducing Security Risks with Cross-Platform DLP

Reducing Security Risks with Cross-Platform DLP

Nowadays, the majority of businesses work with a mixture of device types and operating systems. Cross-platform Data Loss Prevention (DLP) solutions help diminishing security vulnerabilities in heterogeneous IT environments. Over the past decade, the organizations have...
5 Best Practices for Data Breach Prevention in 2019

5 Best Practices for Data Breach Prevention in 2019

In today’s digital economy an increasing volume of information is collected and data is turning not only into a more valuable, but also into a more vulnerable resource. For businesses it has become a key input for growth, differentiation and for maintaining...
5 steps to building a security practice

5 steps to building a security practice

The majority of my colleagues running a security practice ended up there by accident. Most of them inherited a security role through necessity or promotion and only a few choose a security career. Either way, we are special people that don’t see daylight...
5 Ways Big Companies Protect their Data

5 Ways Big Companies Protect their Data

In recent years, data protection has become a must for all companies, no matter their size. While big organizations suffering data breaches such as Facebook, Orbitz or Quora are the ones making headlines, a more troubling reality awaits small and mid-sized companies:...
All You Need to Know about the NIST Cybersecurity Framework

All You Need to Know about the NIST Cybersecurity Framework

The last few years have transformed cybersecurity and data protection from niche concerns to major problems as both individuals and organizations suffered from an unprecedented wave of cyberattacks and data theft. Governments around the world have stepped up and have...
Data Protection Regulations in the Middle East

Data Protection Regulations in the Middle East

The EU’s General Data Protection Regulation has sparked a global legislative movement that aims to vouchsafe individuals’ privacy and curb data vulnerability. While some of these new regulations were years in the making, many were directly influenced by the...