BLOG
54% of organizations have experienced a cyberattack over the last 12 months, and year over year, the number of attacks…
BLOG
Healthcare breaches are increasing. According to the 2022 Ponemon institute Report, not only did the number of overall third-party attacks…
BLOG
Patient care isn’t just about meeting a patient’s medical and physical needs. It involves keeping the digital identity of the…
BLOG
Controlling what assets, data or systems a given user can access is the crux of modern cybersecurity architecture. Fine-grained access…
BLOG
Law firms have exactly what cyber attackers want – confidential and sensitive data, PII, intellectual property, contract details, trade secrets…
BLOG
Like many industries, healthcare is no longer analog. From a patient’s perspective, this digital transformation could mean doing a routine…
BLOG
A former Amazon employee uses her knowledge to find servers that have been misconfigured to allow access. She exploits that…
BLOG
It’s no secret that organizations are changing the way they operate. Digitization is everywhere, and employees are going from desktops…
BLOG
Human error: It’s an everyday occurrence and happens to everyone at some point or another. Unfortunately, when it comes to…
BLOG
It only took two attacks for Brazilian e-commerce platform, Americanas.com, to lose millions. The attacks, over two days in February…
BLOG
Identity governance is key to managing user access, streamlining compliance, and enforcing least privilege access to reduce the risk of…
BLOG
The current trends in the cyber landscape are all rotating around one axis — access points. Hackers and cybersecurity professionals…