Cybersecurity


On November 12, at the UNESCO Internet Governance Forum (IGF), President Emmanuel Macron launched the Paris Call for Trust and Security in Cyberspace. This high-level declaration on developing common principles for securing cyberspace is meeting with mixed reviews.  Some optimistic that it is a step in the right direction and […]

The Paris Call for Trust and Security in Cyberspace – ...


The cybersecurity skills shortage has many organizations scrambling to find more talent and to find ways to make their analysts more productive.  In an effort to provide some insight into one possible solution to help alleviate this problem, we spoke with Caitlin Huey, senior threat analyst for EclecticIQ Fusion Center. […]

How You Can Increase the Productivity of Security Analysts



Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web SlashNext, the leader in real-time phishing site detection for businesses, released new survey data suggesting a dangerous lack of understanding and gaps in protection against modern, fast-moving phishing attacks. A revealing survey of cybersecurity decision-makers showed that […]

SlashNext Survey Reveals 95% of IT Security Pros Underestimate Phishing ...


California’s “CCPA” Has a Potentially Huge Footprint. On June 28, 2018, The State of California passed into law a controversial landmark measure affecting not only the state of California but companies around the globe who have customers in that state. The California Consumer Privacy Act (CCPA) was drawn in direct […]

CCPA: The Importance of Understanding and Complying With the New, ...




TITUS’ Intelligent Protection Offers Machine Learning Driven by Classification to Reduce Risk of Data Loss TITUS, a leading provider of data protection solutions, has announced TITUS Intelligent Protection, which adds breakthrough machine learning advances to its TITUS Classification Suite of solutions.  We were curious about this – and knew you […]

Machine Learning Capabilities Aid in Identifying and Protecting Critical Data