architecture

Data exfiltration: The art of distancing

We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …

user

How to establish a threat intelligence program

Instituting an in-house cyber threat intelligence (CTI) program as part of the larger cybersecurity efforts can bring about many positive outcomes: The organization may …

lock

A look inside privacy enhancing technologies

There is a growing global recognition of the value of data and the importance of prioritizing data privacy and security as critical cornerstones of business operations. While …