Normalising data leaks: A dangerous step in the wrong direction

It was only recently, in early April, when it came to light that the personal data from over 500 million Facebook profiles had been compromised by a data leak in 2019. And since then, an internal Facebook email has been exposed, which was accidentally sent to a Belgian journalist, revealing the social media giant’s intended strategy for dealing with […]
The data dichotomy and the vital importance of effective self-regulation

The data privacy debate that has raged for the past decade has patently failed to meet the needs of either industry or consumers. Legislative change continues to challenge digital marketing models – and has had little impact on consumer trust: Edelman’s 2021 Trust Barometer cites an era of “information bankruptcy”, with global trust levels at […]
A new chapter in remote IoT security

By Keith Glancey, Systems Engineering Manager at Infoblox When the COVID-19 pandemic struck, businesses around the world found themselves forced to adapt quickly in order to survive. IT and security teams took centre stage, and were tasked with supporting a newly-remote network of employees and maintaining business continuity. Many companies emphasised ‘connectivity first,’ relegating security to […]
WEBINAR: Overcoming The Challenges Of Selecting An Insider Threat Detection Tool

By Veriato In a crowded market with so many new products being released, it can often be hard to make sure you’re getting the right tool for your organization’s security needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming. In our latest webinar, we try and […]
How insider threats and the dark web increase remote work risks for organizations

By Veriato The “Dark Web” is often portrayed as a gloomy realm of internet land where you can find criminals and offenders lurking around every corner. Though there is some truth to this perception, there are also many misconceptions about the Dark Web and its role in the security or insecurity of businesses. Furthermore, the […]
Cybersecurity is not a one-stop-shop

By Steve Law, CTO, Giacom and Kelvin Murray, Threat Researcher, Webroot Boris Johnson announced the Government’s roadmap to lift Coronavirus restrictions for both businesses and the general public earlier in February, and since then, this has provided a glimmer of hope for many across the country. However, since the start of the pandemic, the way business is conducted […]
The Complete Guide to Online Brand Protection
By Digital Shadows Effective Online Brand Protection requires continual monitoring and remediation of threats to a company’s brands across social, mobile, websites, and other external sources. This approach often requires the involvement of the security, marketing, brand, and legal teams. While approaches to Online Brand Protection once amounted to tracking negative sentiment on Twitter, this […]
WEBINAR: Solorigate/SUNBURST – Chronology of a supply chain nightmare

By SentinelOne and ReliaQuest SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the […]
Cyber Threat Intelligence – Solutions Guide & Best Practices

By Digital Shadows Cyber threat intelligence (CTI) improves the resilience of your business against emerging cyber threats. The best CTI program informs preventative and proactive security actions and is intimately tied to business concerns and effective reduction of risk. This guide serves to: Navigate you through the jargon surrounding cyber threat intelligence Outline some of […]
WHITE PAPER: Active Directory security – AD monitoring and proactive security detection combined

“Active Directory security” generates a few different reactions, depending on who you ask. Get the new guide from Microsoft 17x MVP Derek Melber to discover: The attacker-shaped holes in common monitoring solutions The 8 key features to proactively secure AD How Alsid can strengthen your security posture Start reading the free guide