
X-ray your SaaS apps to reveal hidden security vulnerabilities
Best practices to understand security evaluations what is happening "under the hood" of cloud/SaaS applications.

Exploring the paradigm shift from backup to data protection
Smart organizations evaluate their overall data footprint and transform their traditional back office IT to a streamlined data protection approach for both cloud and on-premises data.

The wild west of cryptocurrency security – and what the future holds
Time will tell how virtual currency security issues ultimately get resolved, but as we wait, keep changing those passwords and please, try not to throw away your key.

How the International Olympic Committee can win gold in cybersecurity
While hackers like “Fancy Bears” may continue their mission to create headline-grabbing attacks and disruptive behavior, there are steps every institution across the world and in varying industries can take so they don’t fall victim. ...

What’s in store for security in 2018?
2018 will be a crucial year in determining our strength against vicious hackers. Here’s a glimpse at what we can expect.

Implementing DMARC: why email security should be the No. 1 priority
How implementing the email authentication protocol DMARC can secure your organization.