Blogs


blog post
Is Linux a vulnerability in your data security posture?

Linux, is one of the most powerful operating systems in the planet, dominating cloud platforms and servers. It’s the power behind…

Uncategorized

blog post
Securing customer data in an e-commerce environment

Thanks to the pandemic, e-commerce has become the de facto business model all over the world. While this has opened…

consumer privacy Data privacy Data Protection Uncategorized

blog post
Go Beyond Prioritizing Data Security and Privacy

Practical advice for implementing data protection tools Sweeping data privacy regulations are a catalyst for more significant data protection measures…

Data privacy Data Security Uncategorized

blog post
The costly (and dangerous) limits to your next-gen firewall and CASB solutions

Data security has taken on a whole new importance these days. As the average cost of a data breach continues…

Uncategorized

blog post
Tax Security Checklist: How to file safely and avoid data theft

In 2020, the IRS exposed $2.3 billion in tax fraud, ranging from identity theft to refund fraud. The agency also…

Data Protection Data Security Uncategorized

blog post
How to refocus your cybersecurity team’s assumption of compromise paradox to a data protection model

About the author From solutions architecture to security, Gumbs Gumbs brings deep technical experience to his position as Chief Innovation…

Breaches Data Protection Data Security Uncategorized

blog post
The emerging risk of unstructured data in the public cloud

About the author From solutions architecture to security, Gumbs Gumbs brings deep technical experience to his position as Chief Innovation…

Breaches data breach Data privacy Data Protection Data Security Uncategorized

blog post
Healthcare under attack: How backup systems make or break your response to ransomware

When the global pandemic began to impact the U.S. with shut downs and concerns about the ability for medical facilities…

Breaches Data privacy Data Protection Data Security Uncategorized