Most recent

Red Team 104: CrackMapExec

Red Team 103: Understanding Sqlmap

Red Team 102: Understanding Metasploit


Red Team 101: Understanding Kali Linux

Managing the Intersection of Cryptocurrency and Compliance

Want to Make $100 Million from Hacking? Steal Press Releases


Bug Spells Doom for Nearly-Vacant Google+ Network

Why DNSSEC Isn't Enough

Working with Our Partners to Mitigate the Faxploit Threat


MSSP vs MSP: What a Missing “S” Could Mean for Your Company

130 Million Hotel Customers Breached Due to Exposed Database

How to Protect Your SMB Clients from Ransomware


How to Speed Up DevOps in 3 Steps

Anonymous Application Access: Get This Valuable Service Safely On Board

How’s It Going With the GDPR? Steps To Take To Protect Your Business This Fall


Botnets: The Living Dead of The Malware World

4 DMZ Best Practices to Shield You From Attackers

You Can’t Fix Authentication Without Fixing Access


Use Redis? There's a Good Chance It's Been Co-Opted

If You Still Use PGP, READ THIS NOW

What Does “Software Defined Perimeter” Mean to YOU?


How Ransomware Is Changing Cybersecurity and What To Do About It

Beat the Odds: Why It’s Not Too Late To Start GDPR Compliance

Don’t Be GDPR Complacent, It’s Time to Get Compliant


Data Protection Officer - Dos & Don'ts for GDPR Challenges

Law Firm Data is Catnip for Hackers

State-Level Cybersecurity is Hard to Fix


SWIFT Cyber-Attackers Strike Again - Organizations Must Turn to the Software Defined Perimeter

Encrypting Popular Client Emails is Hard Work

Are You Securing Cloud Storage Wrong?


Global Data Protection Laws: Japan

Global Data Protection Laws: South Korea

More Vendors Mean More Cyberattacks – Protect Your Supply Chain!


Preparing for Industrial Cyberattacks: Does your Industry Have a Plan?

Global Data Protection Laws: The Philippines

Industrial Security: Is the Air Gap Still Viable?


2018 Will Be an Interesting Year for Information Security – Here’s How Safe-T Can Help

Can Banks Add Anonymous Application Access in time for PSD2?

How Your Employees Can Securely Share Files via Secure Cloud Access


Data Breach Rundown: Year by Year

40% of Executives Say Security Hinders Hybrid Cloud Adoption

3 Risky Scenarios of Online Application Sharing


Safe-T’s Top 6 Cybersecurity Predictions for 2018

Don’t Leave Your Web Applications Vulnerable to Attackers

It's Time To Leave Your PGP Security Behind


The Truth About The Deloitte Security Breach 

How to Prevent Malware Hackers from Accessing Your Software

Is Your Amazon S3 Server Secure? A 1-in-10 Chance Says It’s Not


Keep your Company's Data in the Right Hands with our Software-Defined Access Solution

MSP: Is Your New Digital Service Compliant?

Surprise! A New Cyber Security Compliance Just Took Effect


How to Reduce Your Cyber-Attack Surface Before It's Too Late

What will Software Defined Perimeter Mean for Compliance?

Equifax Demonstrates All the Wrong Ways to Respond to a Data Breach 


Understanding the new Cloud Security Guidance from the CSA

Will Platform Consolidation Dismantle Your Security Solutions?

NotPetya Caused Maersk to Lose Hundreds of Millions in US Dollars


Why the Sun (Data) in Your Enterprise Craves A Total Solar Eclipse (Attack Surface Reduction)

Secure Data Access and the GDPR

How Secure Data Exchange Will Let Companies Comply with the GDPR


Everything You Need to Know About the Swedish Data Leak

Will the GDPR Stifle Digital Innovation?

Cyber Crime is Already a Threat to Human Life


How Will You Protect Data on Hybrid Cloud Storage?

Fileless Malware Attacks are a Bad Sign for the Security Landscape

Do We Have to Hire a Data Protection Officer? Understanding the Role of the DPO


3 Ways the General Data Protection Regulation Might Have Been a Whole Lot Worse

GoldenEye “NotPetya” Ransomware Is Disrupting The Globe With Irreversible Damage

So you WannaCry or get Petya-rified, or you Wanna-Be-Safe?


4 Tips for Data Governance Mastery

How Have Technology Security Budgets Changed?

The GDPR Compliance Deadline is Nearly Upon Us—What Does this Mean for Email?


Exploring the Unknown: How Cloud Access is like the World Exploration of the 1800s

Managing Secure Data Exchange in Autonomous Systems

You've Been Audited —Is your PCI DSS, SOX & HIPAA Compliance in Order?


New Big Data Security Guidelines in the Cloud

How to Achieve Secure Data Sharing with Third Parties

Is Your Accounting Data Truly Secure?


How to Secure Legal Records from Cyber Hackers

Insurance Companies: A Hacker’s Paradise

The WannaCry Ransomware Attack is Cybercrime on the Scale of a Natural Disaster


Filling the Gap In Law Firm Security

10 Ways To Secure Legal Documents

10 Ways Your Jewish Federation Can Start Adopting Cyber Security Too


6 Predictions for Cyberattacks and Threats in 2017

Protecting Your Data With Secure Cloud Access

CyberSec News - January 2017


CyberSec News - December 2016

How a Cybersecurity Upgrade Can Protect the US Elections

How to Overcome Technology M&A Security Risks


CyberSec News - November 2016

Large Scale DDoS Cyber Attack Breaks Internet

7 Ways To Avoid Getting Caught In The Next Phishing Attack


Is your CPA Properly Securing Tax Records?

How to Prevent Your Emails from Ending up on WikiLeaks

New York Cyber Security Regulations: Is this the beginning?


File Sync and Sharing — What You Need to Know

Never Underestimate the Risk of a Cyber Attacker

CyberSec News - September 2016


Securing America - The U.S. Presidential Debate

Yahoo! Largest Cyber Attack of All Time

Trust No One: How to Secure File Uploads from Customers


FBI Election Flash Alert: Increase Computer Security

DNC Hack & RNC Denial of Hack Claim

Best Security Practices for Protecting U.S. Election Data


Securely Sharing Data with Business Partners and Agencies

Don't Wait for the FBI to Protect You from a Cyber Attack

CyberSec News - August 2016


How to Battle Cyber Attacks in the Cloud

Why Your MSSP Should Offer a Secure Cloud Storage Solution?

How to Secure Communication with Your Customers & Prevent Data Leakage


U.S. Elections: Big Target for Another Data Breach

Ensuring Your Security Solutions are NIST 800-53 Compliant

A Timeline of Cyber Security Incidents in the 2016 Election


Secure Data Exchange Unification the Ultimate Protection

SOX Compliance: Too Important to Ignore

Data Exchange in the Rearview Mirror


2016 Mid-Year Global Review: Cyber Security & Data Breaches

A History of Information Security and Compliance

Methods for Securing Email Exchange


Finding the Proper Balance of Security & Productivity

An A to Z Guide to Secure File Transfer

Safe-T Box Cloud Access Security Broker (CASB) Video


Cloud Data Protection Must Extend to Secure Email Exchange

Join Safe-T at Infosecurity Europe

How to Secure Cloud Storage


Those Convenient URL Shorteners are Ruining Cloud Security

Overview of the RSA Information Security Conference 2016

Are You Sending Secure Email Messages?


Safe-T interviews Andrew Hay, DataGravity CISO

Life after Microsoft Forefront UAG | Safe-T

HIPAA Compliance and Certification in the USA


2015 Global Cyber Security Threats Review & Tips for 2016 | Safe-T

Are Healthcare Companies Maintaining their Security Solution?

Resolving the firewall politics problem


Struggling to show a return on investments (ROI) for Cyber Security spending?

Do you or anyone around you have “Security Complacency”?

You want to grant your partners access to corporate resources – Now what?


Does your existing mission-critical application software integrate well with Windows 10?

Are you using multiple layers of security as a defense mechanism?

Do you have multiple legacy MFT (Managed File Transfer) platforms?


Who is being hacked these days and why is it happening?

Do you use a Micro Security or Macro Security approach when deciding how to best protect information?

Do you want to simplify your Managed File Transfer Service (MFTS) and cover all bases once and for all?


You just discovered that your firm has been hacked… Now what?

Just attended a conference – now what?

What is Social Engineering and who is vulnerable?


Are your Chief Information Officer and Chief Marketing Officer Collaborating?

Behind the Scenes of Dan and Paul Campaign

World leaders’ personal information is not safe anymore?


Ruby and SSL

My First Ruby Gem

Do you need a Chief Risk Officer (CRO) in your firm?


Are you a forward-thinking leader or reactive leader?

The Potential of $1 Billion Stolen from Banks Worldwide – Where is my risk?

Another Cyber Attack into a large firm – What do I do now?


Why Replace DropBox when you can empower it?

The fine print of Cloud File Sync and Share APIs

DropBox used to store confidential documents


DropBox October 2014 Hack

How to Prevent Data Leakage with Secure Email


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!