Request a demo
Secure Application Access
Secure File Access
News & Events
Maintenance and Support
Software Defined Access
zero trust network access
what is software defined perimeter
what is zero trust network access
secure email exchange
what is SDP?
Secure data access
secure data exchange
Law Firm Security
Secure Application Access
secure file and email access
Anonymous Application Access
Secure file access
what is zero trust
secure applications access,
hospitals data breach
Iranian-backed Fox Kitten APT Exploits VPN Vulnerabilities - Here’s Why it Should Matter to You
Zero Trust Can Fix Healthcare’s Security Problem
Zero Trust Trends to Watch Out For in 2020
VPNs—Better Off With ‘Em Or Without ‘Em?
It's Time to Replace SMB with Something Smarter
Time for Something New...
4 DMZ Best Practices to Shield You From Attackers
ZoneZero™ can Prevent Further Lateral Movement Within Compromised Organizations.
Safe-T's ZoneZero- Why Rip and Replace your VPN?
Building Zero Trust With a Software Defined Perimeter
SAFE-T; A Progressive Approach To Zero Trust Access
How SDP Would Have Prevented the Citrix Hack
US Ballistic Missile Agency Fails Security Audit
Red Team 201: Your First Test
Creating A Secure Data Workflow With SDE
What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?
Red Team 104: CrackMapExec
Red Team 103: Understanding Sqlmap
Red Team 102: Understanding Metasploit
Red Team 101: Understanding Kali Linux
Managing the Intersection of Cryptocurrency and Compliance
Want to Make $100 Million from Hacking? Steal Press Releases
Bug Spells Doom for Nearly-Vacant Google+ Network
Why DNSSEC Isn't Enough
Working with Our Partners to Mitigate the Faxploit Threat
MSSP vs MSP: What a Missing “S” Could Mean for Your Company
130 Million Hotel Customers Breached Due to Exposed Database
How to Protect Your SMB Clients from Ransomware
How to Speed Up DevOps in 3 Steps
Anonymous Application Access: Get This Valuable Service Safely On Board
How’s It Going With the GDPR? Steps To Take To Protect Your Business This Fall
Botnets: The Living Dead of The Malware World
4 DMZ Best Practices to Shield You From Attackers
You Can’t Fix Authentication Without Fixing Access
Use Redis? There's a Good Chance It's Been Co-Opted
If You Still Use PGP, READ THIS NOW
What Does “Software Defined Perimeter” Mean to YOU?
How Ransomware Is Changing Cybersecurity and What To Do About It
Beat the Odds: Why It’s Not Too Late To Start GDPR Compliance
Don’t Be GDPR Complacent, It’s Time to Get Compliant
Data Protection Officer - Dos & Don'ts for GDPR Challenges
Law Firm Data is Catnip for Hackers
State-Level Cybersecurity is Hard to Fix
SWIFT Cyber-Attackers Strike Again - Organizations Must Turn to the Software Defined Perimeter
Encrypting Popular Client Emails is Hard Work
Are You Securing Cloud Storage Wrong?
Global Data Protection Laws: Japan
Global Data Protection Laws: South Korea
More Vendors Mean More Cyberattacks – Protect Your Supply Chain!
Preparing for Industrial Cyberattacks: Does your Industry Have a Plan?
Global Data Protection Laws: The Philippines
Industrial Security: Is the Air Gap Still Viable?
2018 Will Be an Interesting Year for Information Security – Here’s How Safe-T Can Help
Can Banks Add Anonymous Application Access in time for PSD2?
How Your Employees Can Securely Share Files via Secure Cloud Access
Data Breach Rundown: Year by Year
40% of Executives Say Security Hinders Hybrid Cloud Adoption
3 Risky Scenarios of Online Application Sharing
Safe-T’s Top 6 Cybersecurity Predictions for 2018
Don’t Leave Your Web Applications Vulnerable to Attackers
It's Time To Leave Your PGP Security Behind
The Truth About The Deloitte Security Breach
How to Prevent Malware Hackers from Accessing Your Software
Is Your Amazon S3 Server Secure? A 1-in-10 Chance Says It’s Not
Keep your Company's Data in the Right Hands with our Software-Defined Access Solution
MSP: Is Your New Digital Service Compliant?
Surprise! A New Cyber Security Compliance Just Took Effect
How to Reduce Your Cyber-Attack Surface Before It's Too Late
What will Software Defined Perimeter Mean for Compliance?
Equifax Demonstrates All the Wrong Ways to Respond to a Data Breach
Understanding the new Cloud Security Guidance from the CSA
Will Platform Consolidation Dismantle Your Security Solutions?
NotPetya Caused Maersk to Lose Hundreds of Millions in US Dollars
Why the Sun (Data) in Your Enterprise Craves A Total Solar Eclipse (Attack Surface Reduction)
Secure Data Access and the GDPR
How Secure Data Exchange Will Let Companies Comply with the GDPR
Everything You Need to Know About the Swedish Data Leak
Will the GDPR Stifle Digital Innovation?
Cyber Crime is Already a Threat to Human Life
How Will You Protect Data on Hybrid Cloud Storage?
Fileless Malware Attacks are a Bad Sign for the Security Landscape
Do We Have to Hire a Data Protection Officer? Understanding the Role of the DPO
3 Ways the General Data Protection Regulation Might Have Been a Whole Lot Worse
GoldenEye “NotPetya” Ransomware Is Disrupting The Globe With Irreversible Damage
So you WannaCry or get Petya-rified, or you Wanna-Be-Safe?
4 Tips for Data Governance Mastery
How Have Technology Security Budgets Changed?
The GDPR Compliance Deadline is Nearly Upon Us—What Does this Mean for Email?
Exploring the Unknown: How Cloud Access is like the World Exploration of the 1800s
Managing Secure Data Exchange in Autonomous Systems
You've Been Audited —Is your PCI DSS, SOX & HIPAA Compliance in Order?
New Big Data Security Guidelines in the Cloud
How to Achieve Secure Data Sharing with Third Parties
Is Your Accounting Data Truly Secure?
How to Secure Legal Records from Cyber Hackers
Insurance Companies: A Hacker’s Paradise
The WannaCry Ransomware Attack is Cybercrime on the Scale of a Natural Disaster
Filling the Gap In Law Firm Security
10 Ways To Secure Legal Documents
10 Ways Your Jewish Federation Can Start Adopting Cyber Security Too
6 Predictions for Cyberattacks and Threats in 2017
Protecting Your Data With Secure Cloud Access
CyberSec News - January 2017
CyberSec News - December 2016
How a Cybersecurity Upgrade Can Protect the US Elections
How to Overcome Technology M&A Security Risks
CyberSec News - November 2016
Large Scale DDoS Cyber Attack Breaks Internet
7 Ways To Avoid Getting Caught In The Next Phishing Attack
Is your CPA Properly Securing Tax Records?
How to Prevent Your Emails from Ending up on WikiLeaks
New York Cyber Security Regulations: Is this the beginning?
File Sync and Sharing — What You Need to Know
Never Underestimate the Risk of a Cyber Attacker
CyberSec News - September 2016
Securing America - The U.S. Presidential Debate
Yahoo! Largest Cyber Attack of All Time
Trust No One: How to Secure File Uploads from Customers
FBI Election Flash Alert: Increase Computer Security
DNC Hack & RNC Denial of Hack Claim
Best Security Practices for Protecting U.S. Election Data
Securely Sharing Data with Business Partners and Agencies
Don't Wait for the FBI to Protect You from a Cyber Attack
CyberSec News - August 2016
How to Battle Cyber Attacks in the Cloud
Why Your MSSP Should Offer a Secure Cloud Storage Solution?
How to Secure Communication with Your Customers & Prevent Data Leakage
U.S. Elections: Big Target for Another Data Breach
Ensuring Your Security Solutions are NIST 800-53 Compliant
A Timeline of Cyber Security Incidents in the 2016 Election
Secure Data Exchange Unification the Ultimate Protection
SOX Compliance: Too Important to Ignore
Data Exchange in the Rearview Mirror
2016 Mid-Year Global Review: Cyber Security & Data Breaches
A History of Information Security and Compliance
Methods for Securing Email Exchange
Finding the Proper Balance of Security & Productivity
An A to Z Guide to Secure File Transfer
Safe-T Box Cloud Access Security Broker (CASB) Video
Cloud Data Protection Must Extend to Secure Email Exchange
Join Safe-T at Infosecurity Europe
How to Secure Cloud Storage
Those Convenient URL Shorteners are Ruining Cloud Security
Overview of the RSA Information Security Conference 2016
Are You Sending Secure Email Messages?
Safe-T interviews Andrew Hay, DataGravity CISO
Life after Microsoft Forefront UAG | Safe-T
HIPAA Compliance and Certification in the USA
2015 Global Cyber Security Threats Review & Tips for 2016 | Safe-T
Are Healthcare Companies Maintaining their Security Solution?
Resolving the firewall politics problem
Struggling to show a return on investments (ROI) for Cyber Security spending?
Do you or anyone around you have “Security Complacency”?
You want to grant your partners access to corporate resources – Now what?
Does your existing mission-critical application software integrate well with Windows 10?
Are you using multiple layers of security as a defense mechanism?
Do you have multiple legacy MFT (Managed File Transfer) platforms?
Who is being hacked these days and why is it happening?
Do you use a Micro Security or Macro Security approach when deciding how to best protect information?
Do you want to simplify your Managed File Transfer Service (MFTS) and cover all bases once and for all?
You just discovered that your firm has been hacked… Now what?
Just attended a conference – now what?
What is Social Engineering and who is vulnerable?
Are your Chief Information Officer and Chief Marketing Officer Collaborating?
Behind the Scenes of Dan and Paul Campaign
World leaders’ personal information is not safe anymore?
Ruby and SSL
My First Ruby Gem
Do you need a Chief Risk Officer (CRO) in your firm?
Are you a forward-thinking leader or reactive leader?
The Potential of $1 Billion Stolen from Banks Worldwide – Where is my risk?
Another Cyber Attack into a large firm – What do I do now?
Why Replace DropBox when you can empower it?
The fine print of Cloud File Sync and Share APIs
DropBox used to store confidential documents
DropBox October 2014 Hack
How to Prevent Data Leakage with Secure Email
All Rights Reserved