Protect Sensitive Data in your Office 365 EnvironmentMicrosoft Office 365 is more than just email, it includes communication, storage, and productivity solutions, all of which integrate with your existing business systems, processes and data. Migrating to Office 365 means users can create, access, manage, and transmit business related information from...
This past week, hackers took advantage of a 0-day to steal ISP customers' credentials, a former Verizon employee pleaded guilty to feeding info to a Chinese spy agency, and more. Get up to speed in this week's Friday Five!
This past week, BreachForums was taken down for a second time, an Arizona woman was arrested for her role in a North Korean remote work scheme, CISA and the NIST released new guidance, and more. Catch up on all the latest news in this week's Friday Five.
An FBI report on rising cybercrime topped this week's headlines and was further underscored by an IP theft scandal at Google, but new initiatives from the White House and NSA aim to combat such threats. Get up to speed on these stories and more in this week's Friday Five!
In this week's Friday Five, learn how internal threat actors are finding success, the U.S. and allies are fighting foreign espionage campaigns, a new bill could fortify the U.S. cybersecurity workforce, and more.
Your employees are everywhere. So is your data. Have we equipped our teams to deal with this situation?In this on-demand webinar, cybersecurity industry veteran and Fortra’s Director of Product Management for Data Protection Wade Barisoff will discuss his experience on both sides of the table, both as a Fortune 500 security director as well as leading product direction at Fortra.Our 30-minute...
A rise in cyberattacks’ volume and sophistication, lawmakers cracking down on privacy, the rising threats to critical infrastructure, and more. Catch up on these stories and more in this week’s Friday Five!
A recent report said that almost half of data breaches involve an insider element. In this blog we define what constitutes an insider threat and give you nearly 50 examples to help illustrate the threat further.
This company protected its sensitive data with biometric thumbprint scanner but still managed to suffer trade secret theft after a former director of research allegedly stole gigabytes of data on its recipes.
Verizon's new Insider Threat Report breaks down five categories of inside threat actors and outlines 11 steps to reduce risk and defend against malicious insiders.