Top Ways to Mitigate an Insider Threat

Organizations have historically implemented external-facing technologies such as firewalls and proxies to deal with external threats, but with the emerging prominence of ...
Read More

A Security Checklist for Financial Services Organizations

In the eyes of the cyberattacker, just about anything and everything out there is a target. But whether for the theft of personal and confidential information (such as ...
Read More

Prosegur Reaches Agreement To Acquire Majority Stake in Cipher

Cipher is a leading cybersecurity company with main operations in the United States, Brazil and United Kingdom.  The combination of Prosegur, a global benchmark in the ...
Read More

How to Enable a Culture of DevOps in Security

DevOps as a whole is a state of mind for organizations. It helps them to deliver applications and services by espousing a culture and best-practice methodology that drive ...
Read More

Use these Critical Security Controls for a Better Security Posture

As we near the end of 2018, technology professionals and businesses alike are looking back on the last 12 months and evaluating highs and lows. For businesses, this can be an ...
Read More

The Key Components to an Information Security Policy

Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide ...
Read More

Consider These Factors When Calculating the Cost of a Data Breach

Data breaches are one of the most common types of security incidents. It is quite possible, although it may be hard to prove, that every company around the globe was at some ...
Read More

Ways to Reduce the Exorbitant Costs of a Data Breach

Reducing the cost of data breaches is a vital consideration for any good security strategy. In fact, when a breach occurs, many factors can influence its cost, either ...
Read More