How Data Loss Prevention (DLP) Technology Works
Data loss prevention solutions are growing in popularity as enterprises look for ways to reduce...By Prasida Menon | December 2, 2016
Can Cyber-Attacks Be Predicted?
According to the Global Economic Crime Survey 2016 published by PwC, cybercrime is now the...By Prasida Menon | August 22, 2016
What is a Salt and How Does It Make Password Hashing More Secure?
LinkedIn’s massive data breach of 2012 continues to be a source of agony for the...By Prasida Menon | July 20, 2016
Behind the Curtains: The Data Science Powering Cloud Threat Protection Part 3
For earlier posts in this series, see: part 1 and part 2 The deadline for...By Prasida Menon | May 31, 2016
272 Million Password Dump Highlights Need for Strong, Unique Passwords
With the recent password dump of 272 million email credentials including Gmail, Hotmail, Microsoft, Yahoo...By Prasida Menon | May 17, 2016
Data Integrity: The Next Trend in Cyber Attacks?
…The most destructive scenarios involve cyber actors launching several attacks on our critical infrastructure at...By Prasida Menon | March 4, 2016
Is UEBA a Feature or a Product?
According to a 2015 report by Mandiant, the average targeted malware compromise was present for...By Prasida Menon | January 22, 2016
Insider Threat Detection – Privileged User Threats
2015 was a watershed year for cybercrime, and what startled many observers was that a...By Prasida Menon | January 6, 2016
Behind the Curtains: The Data Science Powering Cloud Threat Protection
Security breaches have risen by 48% in the last year according to the IDG CSO...By Prasida Menon | December 10, 2015
How to Catch a Data Thief by Inspecting Their Cloud Usage
A recent study by Juniper Research suggests that with such rapid digitization of consumers’ lives...By Prasida Menon | November 16, 2015