Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we cover unified endpoint management’s rise...

The GDPR: Correcting data security negligence from companies like Facebook, Swisscom and L’express
Incident 1: Facebook, Cambridge Analytica data leak According to The New York Times, Cambridge Analytica tried to influence the 2016 Presidential elections in America. This was executed by using data collected from over...

Password synchronization between Active Directory and Salesforce accounts
As the number of Salesforce user accounts increases within your organization, managing those accounts becomes a challenge. This adds mundane password management tasks to the...

Five worthy reads: Kickstart your GDPR journey
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the fundamentals...

Why automation is the best thing for compliance reporting
The main purpose of compliance auditing is to identify how well a company is following the rules and policies of various regulatory acts. For example,...

Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight blockchain’s huge potential...

GDPR lessons from the Octoly data leak
Back in 2017, Forever 21, Hyatt Hotels, Uber, and eBay all had their fair share of cybersecurity incidents. And now Octoly, a Paris-based influencer agency, is facing their...

Five worthy reads: Machine learning, the next phase of cybersecurity
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we cover how machine learning...