5 Things to Consider for an Insider Threat Audit

5 Things to Consider for an Insider Threat Audit

In today’s world of information technology, insider threats are one of the primary reasons for security breaches. The definition of insider threat includes not just intentional malicious actions but also accidents and cases of negligence. According to the Ponemon...
The CMMC Program

The CMMC Program

As the number of new data privacy regulations and programs coming into effect in the US continues to increase, one of the latest to emerge is the Cybersecurity Maturity Model Certification (CMMC) program. Unlike most of the current state-specific US data privacy...
The Importance of Data Loss Prevention for Macs

The Importance of Data Loss Prevention for Macs

Posted byZoran Cocoara September 19, 2022Posted inMacs in the enterprise In the last ten years, Macs have gradually made their way into the workplace. Their number has increased through Apple’s own efforts to improve their products for use in the enterprise such as...
Understanding and Protecting CUI

Understanding and Protecting CUI

The ever-increasing ability to share information is a double-edged sword. On the one hand, it is much easier to communicate and work more efficiently, but it also means less control over shared information and more people looking at data. This trend, along with ad-hoc...
How Daification and Data Loss Prevention Go Hand in Hand

How Daification and Data Loss Prevention Go Hand in Hand

In an age when data discovery and the protection of sensitive data have become key to reaching compliance with laws and international standards such as the EU General Data Protection Regulation (GDPR), HIPAA, and PCI DSS, data classification and Data Loss...