Network Data Loss Prevention (nDLP) - How Does it Differ from Endpoint Data Loss Prevention (eDLP)?
Looking for a nDLP vs. eDLP cheat sheet? In this blog, we break down how network data loss prevention (nDLP) differs from endpoint data loss prevention (eDLP) and vice versa.
Friday Five: Delayed Cyber Legislation, NIST Updates, Passkeys, & More
Trouble in D.C. is causing cyber legislation delays, fake browser updates are scamming users with malware, and another cybercrime site was taken down this past week. Catch up on all the latest InfoSec updates in this week’s Friday Five!
Deep Web vs. Dark Web: What's the Difference?
While the dark web and the deep web may be used interchangeably, they're not one in the same. Today's blog post digs into differences between them, which is larger, and more.
Friday Five: The Top 10 Misconfigurations, Hacktivism in the Middle East, USPS Phishing Scams, & More
This past week was marked by an increase of DDoS attacks, hacktivism, elaborate phishing scams, and more. Catch up on all of these stories and more in this week’s Friday Five!
Friday Five: Emerging Threats, MFA Troubles, Phantom Hacker Scams, & More
Emerging cyber threats against Linux and Industrial Control Systems (ICSs), organizations’ pain points with identity and security management, and a rise in scamming took this week’s headlines. Catch up on these stories and more in this week’s Friday Five!
What Is File Security? Best Practices & Tools for Security
File security is integral to effective cybersecurity. In today's blog, we dig into the difference between file security and data security, best practices, and tools to implement for file security.
Friday Five: The Approaching Government Shutdown, Protecting Americans' Security and Privacy, & More
The approaching government shutdown brings major cybersecurity concerns, exacerbated by China-based hackers, and meanwhile, efforts to protect Americans’ data privacy and security are underway. Catch up on the latest in this week’s Friday Five!
What is Pretexting? Types, Examples, & Prevention
Pretexting attacks come in all kinds of shapes and sizes. Read this blog to familiarize yourself with the threat so you can keep members of your organization safe.
Friday Five: Malicious AI Campaigns, the Pentagon’s 2023 Cyber Strategy, & More
In the midst of the DHS and Pentagon releasing their Threat Assessment Report and unclassified Cyber Strategy, respectively, three major social media giants came under fire this past week. Catch up on all of these stories in this week’s Friday Five!
Friday Five: A Win for Data Privacy, Conti Members Sanctioned, & More
Wins against cybercrime and the invasion of data privacy took the headlines this past week, but phishing, business email compromise, and the effects of climate change remain as threats against organizations. Catch up on all these stories in this week’s Friday Five!
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!