Incident 1: Facebook, Cambridge Analytica data leak According to The New York Times, Cambridge Analytica tried to influence the 2016 Presidential elections in America. This was executed by using data collected from over...
Password synchronization between Active Directory and Salesforce accounts
As the number of Salesforce user accounts increases within your organization, managing those accounts becomes a challenge. This adds mundane password management tasks to the...
Five worthy reads: Kickstart your GDPR journey
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the fundamentals...
Why automation is the best thing for compliance reporting
The main purpose of compliance auditing is to identify how well a company is following the rules and policies of various regulatory acts. For example,...
Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight blockchain’s huge potential...
GDPR lessons from the Octoly data leak
Back in 2017, Forever 21, Hyatt Hotels, Uber, and eBay all had their fair share of cybersecurity incidents. And now Octoly, a Paris-based influencer agency, is facing their...
Five worthy reads: Machine learning, the next phase of cybersecurity
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we cover how machine learning...
Free webinar: Everything you need to know about ransomware
2017 saw plenty of ransomware attacks, and cyber security experts believe we’ll see many more this year. Needless to say, enterprises are less than happy with that...