DataSecurity Plus | November 19, 2025Mastering cloud app control, Part 3: Governing file transfers In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid...
DataSecurity Plus | November 12, 2025Mastering cloud app control, Part 2: Hardening login security In Part 1 of the cloud app control series, we explored how SinaraTech, a mid-sized...
DataSecurity Plus | November 3, 2025Mastering cloud app control, Part 1: Locking down access When it comes to managing cloud application usage in an organization, the challenges are...
DataSecurity Plus | May 26, 2025The Change Healthcare hack wasn’t just a breach—it was a wake-up call "The US healthcare system is broken" is not an uncommon phrase. With no universal...
DataSecurity Plus | March 6, 2025Top tips: 5 potential use cases of 6G networks Top tips is a weekly column where we highlight what’s trending in the tech world and list...
DataSecurity Plus | October 8, 2024The states of data, Part 3: Data in use and why you need to keep an eye on file activities In our previous blog, The states of data, Part 2: Why visibility is key for protecting...
DataSecurity Plus | September 17, 2024The states of data, Part 1: Why you should protect data at rest, in use, and in motion What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...
DataSecurity Plus | September 3, 2024Data classification: The fundamental requirement of successful DLP programs The way we store data has undergone a dramatic shift. From good ol' floppy disks to...
DataSecurity Plus | July 26, 2024Data security threats: How to safeguard your data from modern pirates [Free e-book] To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...
DataSecurity Plus | March 20, 2024USB review, Part 2: How to manage USB devices In this two-part series, the first blog demonstrates how USB devices can be conduits of...
DataSecurity Plus | January 17, 2024USB review, Part 1: How are USB flash drives a security risk? We've all used pocket-sized USB drives to store and transfer data. We've also lost them...
DataSecurity Plus | October 11, 2023Access granted: Mastering the art of permissions Back in the 20th century, cyberattacks were harder to execute because most computers were...