Most recent

Don’t Leave Your Web Applications Vulnerable to Attackers

It's Time To Leave Your PGP Security Behind

The Truth About The Deloitte Security Breach 


How to Prevent Malware Hackers from Accessing Your Software

Is Your Amazon S3 Server Secure? A 1-in-10 Chance Says It’s Not

Keep your Company's Data in the Right Hands with our Software-Defined Access Solution


MSP: Is Your New Digital Service Compliant?

Surprise! A New Cyber Security Compliance Just Took Effect

How to Reduce Your Cyber-Attack Surface Before It's Too Late


What will Software Defined Perimeter Mean for Compliance?

Equifax Demonstrates All the Wrong Ways to Respond to a Data Breach 

Understanding the new Cloud Security Guidance from the CSA


Will Platform Consolidation Dismantle Your Security Solutions?

NotPetya Caused Maersk to Lose Hundreds of Millions in US Dollars

Why the Sun (Data) in Your Enterprise Craves A Total Solar Eclipse (Attack Surface Reduction)


Secure Data Access and the GDPR

How Secure Data Exchange Will Let Companies Comply with the GDPR

Everything You Need to Know About the Swedish Data Leak


Will the GDPR Stifle Digital Innovation?

Cyber Crime is Already a Threat to Human Life

How Will You Protect Data on Hybrid Cloud Storage?


Fileless Malware Attacks are a Bad Sign for the Security Landscape

Do We Have to Hire a Data Protection Officer? Understanding the Role of the DPO

3 Ways the General Data Protection Regulation Might Have Been a Whole Lot Worse


GoldenEye “NotPetya” Ransomware Is Disrupting The Globe With Irreversible Damage

So you WannaCry or get Petya-rified, or you Wanna-Be-Safe?

4 Tips for Data Governance Mastery


How Have Technology Security Budgets Changed?

The GDPR Compliance Deadline is Nearly Upon Us—What Does this Mean for Email?

Exploring the Unknown: How Cloud Access is like the World Exploration of the 1800s


Managing Secure Data Exchange in Autonomous Systems

You've Been Audited —Is your PCI DSS, SOX & HIPAA Compliance in Order?

New Big Data Security Guidelines in the Cloud


How to Achieve Secure Data Sharing with Third Parties

Is Your Accounting Data Truly Secure?

How to Secure Legal Records from Cyber Hackers


Insurance Companies: A Hacker’s Paradise

The WannaCry Ransomware Attack is Cybercrime on the Scale of a Natural Disaster

Filling the Gap In Law Firm Security


10 Ways To Secure Legal Documents

10 Ways Your Jewish Federation Can Start Adopting Cyber Security Too

6 Predictions for Cyberattacks and Threats in 2017


Protecting Your Data With Secure Cloud Access

CyberSec News - January 2017

CyberSec News - December 2016


How a Cybersecurity Upgrade Can Protect the US Elections

How to Overcome Technology M&A Security Risks

CyberSec News - November 2016


Large Scale DDoS Cyber Attack Breaks Internet

7 Ways To Avoid Getting Caught In The Next Phishing Attack

Is your CPA Properly Securing Tax Records?


How to Prevent Your Emails from Ending up on WikiLeaks

New York Cyber Security Regulations: Is this the beginning?

File Sync and Sharing — What You Need to Know


Never Underestimate the Risk of a Cyber Attacker

CyberSec News - September 2016

Securing America - The U.S. Presidential Debate


Yahoo! Largest Cyber Attack of All Time

Trust No One: How to Secure File Uploads from Customers

FBI Election Flash Alert: Increase Computer Security


DNC Hack & RNC Denial of Hack Claim

Best Security Practices for Protecting U.S. Election Data

Securely Sharing Data with Business Partners and Agencies


Don't Wait for the FBI to Protect You from a Cyber Attack

CyberSec News - August 2016

How to Battle Cyber Attacks in the Cloud


Why Your MSSP Should Offer a Secure Cloud Storage Solution?

How to Secure Communication with Your Customers & Prevent Data Leakage

U.S. Elections: Big Target for Another Data Breach


Ensuring Your Security Solutions are NIST 800-53 Compliant

A Timeline of Cyber Security Incidents in the 2016 Election

Secure Data Exchange Unification the Ultimate Protection


SOX Compliance: Too Important to Ignore

Data Exchange in the Rearview Mirror

2016 Mid-Year Global Review: Cyber Security & Data Breaches


A History of Information Security and Compliance

Methods for Securing Email Exchange

Finding the Proper Balance of Security & Productivity


An A to Z Guide to Secure File Transfer

Safe-T Box Cloud Access Security Broker (CASB) Video

Cloud Data Protection Must Extend to Secure Email Exchange


Join Safe-T at Infosecurity Europe

How to Secure Cloud Storage

Those Convenient URL Shorteners are Ruining Cloud Security


Overview of the RSA Information Security Conference 2016

Are You Sending Secure Email Messages?

Safe-T interviews Andrew Hay, DataGravity CISO


Life after Microsoft Forefront UAG | Safe-T

HIPAA Compliance and Certification in the USA

2015 Global Cyber Security Threats Review & Tips for 2016 | Safe-T


Are Healthcare Companies Maintaining their Security Solution?

Resolving the firewall politics problem

Struggling to show a return on investments (ROI) for Cyber Security spending?


Do you or anyone around you have “Security Complacency”?

You want to grant your partners access to corporate resources – Now what?

Does your existing mission-critical application software integrate well with Windows 10?


Are you using multiple layers of security as a defense mechanism?

Do you have multiple legacy MFT (Managed File Transfer) platforms?

Who is being hacked these days and why is it happening?


Do you use a Micro Security or Macro Security approach when deciding how to best protect information?

Do you want to simplify your Managed File Transfer Service (MFTS) and cover all bases once and for all?

You just discovered that your firm has been hacked… Now what?


Just attended a conference – now what?

What is Social Engineering and who is vulnerable?

Are your Chief Information Officer and Chief Marketing Officer Collaborating?


Behind the Scenes of Dan and Paul Campaign

World leaders’ personal information is not safe anymore?

Ruby and SSL


My First Ruby Gem

Do you need a Chief Risk Officer (CRO) in your firm?

Are you a forward-thinking leader or reactive leader?


The Potential of $1 Billion Stolen from Banks Worldwide – Where is my risk?

Another Cyber Attack into a large firm – What do I do now?

Why Replace DropBox when you can empower it?


The fine print of Cloud File Sync and Share APIs

DropBox used to store confidential documents

DropBox October 2014 Hack


How to Prevent Data Leakage with Secure Email


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

close

Contact Us:

Contact Us: