A perspective on next generation cybersecurity, compliance risks and the cloud

January 04, 2018

New Google Apps script vulnerability extends URL-based threats to SaaS platforms

Maor Bin

Proofpoint researchers discover a new means of exploiting Google Apps Script to deliver malware via URLs.

December 28, 2017

How to Use Gartner’s Magic Quadrant for Enterprise Information Archiving

Martin Tuip

Organizations are these days tasked with an increasingly complex set of priorities amid a digital transformation that is changing the way people work. However, they still must capture and archive business records and make them discoverable.

December 05, 2017

The Great Disconnect: Perception and Reality of GDPR readiness in the UK, France and Germany

Adenike Cosgrove

On 25 May 2018, the General Data Protection Regulation (GDPR) will come into effect globally. The new regulation is designed to strengthen and unify data protection for everyone within the European Union (EU).

November 20, 2017

5 Common Mistakes Made When Implementing DMARC

Ryan Terry

DMARC, or Domain-based Message Authentication Reporting & Conformance, protects an organization’s trusted domains from email spoofing attacks.  Due to the rapid expansion of

November 13, 2017

Foreign IPs Spoofing U.S. Government Email Domains Underscore Urgency of DHS Directive on Authentication

Robert Holmes

Those of us with a strong interest in restoring trust to the email ecosystem received some great news last month, as the US Department of Homeland Security issued a directive (BOD 18-01) mandating that federal agencies authenticate their email to eliminate spo

November 11, 2017

Email Fraud Continues to Expand its Footprint in Q3 2017

Ryan Terry

Email fraud, or business email compromise, is a growing threat that impacts organizations of all shapes and sizes.  These highly targeted email attacks that spoof trusted executives or partners, often don’t include a payload - such

November 07, 2017

Healthcare Can Improve Cybersecurity Posture With DMARC Email Authentication

Craig Huitema

We authenticate everything we need to trust in IT. Except email. This is part of the reason email is the number one threat vector in healthcare, as well as basically every type of organization.

October 17, 2017

U.S. Government’s DMARC Mandate: A Step in the Right Direction

Robert Holmes

Following a letter by Senator Ron Wyden back in July calling for government-wide use of email authentication, The Department of Homeland Security (DHS) announced on Monday that it would increase security for anyone receiving email from federal agencies or visi

October 16, 2017

Digital Transformation is Redefining Cybersecurity. Are You Prepared?

Ryan Kalember

The rapidly evolving pace of digital transformation promises new levels of efficiency, agility, and responsiveness for your organization, your supply chain, and your customers.

October 05, 2017

Wi-Fi Man-in-the-Middle Attacks: New eBook on What to Know, How to Stop Them

Duane Kuroda

Anyone who leaves home with a mobile phone (i.e. everyone) knows it won’t be long before they connect to a wireless network. And when they do, it had better be a trusted and secure choice so they don’t endanger their personal identity or company data.