What is an Insider Attack?

Insider cyber attacks are a common cause of data breaches, and the volume of attacks, as well as the overall…

Why is endpoint data protection so important?

Enterprises across all industries operate on consumer data. In addition to being necessary for completing day-to-day business functions, this data…

Remote Endpoint Device Data Security Implications

Prior to March 2020, remote work wasn’t exactly the norm. Yes, more and more companies were starting to embrace it…

Remote Work 2.0: Controlling the ever-expanding IT frontier

Why the demands of a remote-centric workforce require endpoint protection in the new generation of data lifecycle management tools.

Why Florida’s new Cybersecurity Operations Center law is relevant to battling cybercrime

On June 29, Florida governor Ron DeSantis signed into law H.B. 1297, a bill designed to assist the state in…

Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier

The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to…

Improving incident resolution time by 30 percent at Kent State University

Customer Challenge Kent State University encompasses eight Ohio campuses with six other U.S. locations and four worldwide locations, supports more…