Insights

Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Webinar

Protecting Your Office Away from the Office

How organizations can secure remote access for employees and third parties
Webinar

You Rolled Out VPN and MFA: Now What?

How to build a phased approach to remote access and streamline your MFA implementation.
Webinar

SecOps Under Crisis

Building and maintaining SOC resiliency, even during periods of crisis. How to structure your SOC, manage inconsistent workforce, and remain secure...
Blog

What You Need to Know about Brazil’s New Persona…

Updated April 10, 2020 The implementation of the EU’s General Data Protection Regulation (GDPR) unleashed a wave of new privacy legislation across the world, spreading across the Atlantic to Brazil. On August 14, 2018, the Brazilian Federal Senate signed the Brazilian Personal Data Protection Regulation, referred to …
Blog

Cookies and Compliance: How Key Data Privacy Regul…

Using online cookies has become ubiquitous among organizations across all industries due to their ability to enhance and simplify user experience and to inform the business on its client base. However, since cookies allow businesses to track, store, and share user behavior, cookies are now the source of privacy concern…
Blog

Privileged Account Onboarding: Are You Asking the …

In 2020, there are a host of privileged access management (PAM) tools available, each with their own set of cool features. But the success of your PAM solution implementation isn’t solely reliant on the PAM provider you choose, but also on how your organization defines and views PAM. Regardless of which PAM platform(…
Blog

4 Free Cybersecurity Awareness Email Templates To …

Check out our Covid-19 cyber awareness email template here.  The 2019 Verizon Data Breach Report identified phishing as the number one cause of data breaches and the most disruptive type of cyberattack. These schemes are common because:   They're easy. Even novice criminals can execute a phishing scheme…
Blog

Recent Data Breaches and Increasing Standards of C…

Last year, there were over 2,000 confirmed data breaches. While most breaches highlighted in the media occur at large, well-known companies, those that happen at smaller companies can still have a devastating impact on consumers and result in severe consequences. Two unrelated web-based companies, i-Dressup and ClixSen…
Blog

What You Should Know about NIST’s New Privac…

A recent Cisco study found that 80% of consumers are willing to act to protect their privacy, saying they would spend more time and money to do so and that they consider it a buying factor. Nearly half of these respondents also indicated that they had switched companies over data privacy policies or data sharing practi…