Most recent

Industrial Security: Is the Air Gap Still Viable?

In theory, the digital aspect of industrial control systems is supposed to be air-gapped from run of the mill corporate networks. In practice, however, there will often be bridges – left either accidentally or on purpose – between industrial controls and the general-purpose internet. 

Read More
07 Feb 2018

2018 Will Be an Interesting Year for Information Security – Here’s How Safe-T Can Help

As of this writing, we’re just a month into 2018, and it’s already looking like an interesting year in the realm of information security. Here, interesting means fraught. The first few days of the year ushered in devastating news in the form of the Specter and Meltdown vulnerabilities. 

Read More
01 Feb 2018

Can Banks Add Anonymous Application Access in time for PSD2?

We’ve already spoken extensively about the need for enterprises to occasionally offer access to their data to nearly anyone who asks for it. 

Read More
25 Jan 2018

How Your Employees Can Securely Share Files via Secure Cloud Access

Everyone values efficiency and simplicity, which is why thousands of technology startups and established companies have been “disrupting” the old way of doing business with new solutions for long-standing challenges. 

Read More
18 Jan 2018

Data Breach Rundown: Year by Year

Another year has gone by – another year that seems to have been a single all-consuming cyber-disaster. 2017 has been so bad for information security that it’s hard to even visualize separate security incidents. 

Read More
10 Jan 2018

40% of Executives Say Security Hinders Hybrid Cloud Adoption

According to Senior Analyst at ESG, a growing number of organizations are jumping on the cloud computing bandwagon - and security is a big reason why. Securing public cloud volumes post-migration can be a huge challenge for companies for many reasons:
Read More
02 Jan 2018

3 Risky Scenarios of Online Application Sharing

File upload is one of those can’t-live-with-it, can’t-live-without-it items that makes information security so fraught with difficulty. On the one hand, it automates parts of doing business – especially B2C business – that would typically require a person to make a phone call, send an email, or even dust off their fax machine.

Read More
26 Dec 2017

Safe-T’s Top 6 Cybersecurity Predictions for 2018

Knowing what's changing in the tech world is a crucial way to drive your own IT department and compete in business. For example, over the past year, quite a few CISOs and other execs have had to brush up on their knowledge of trends like cloud service delivery and container virtualization. 

Read More
18 Dec 2017

Don’t Leave Your Web Applications Vulnerable to Attackers

Over 70% of cloud-based cyberattacks are focused on web applications, according to new research. This figure rightly has business owners worried.
Read More
11 Dec 2017

It's Time To Leave Your PGP Security Behind

In the world of private encryption, there are few words more apocalyptic than “I gave away my private key.” It is rule number one of PGP security – never reveal your private key to anyone else. 

Read More
30 Nov 2017

Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

Contact Us: