Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Device Authority's Certificate Lifecycle Management Platform

In today’s digital landscape, where security breaches and data vulnerabilities are rampant, organizations must be equipped with robust measures to protect their valuable assets. One critical aspect of cybersecurity is managing certificates effectively throughout their lifecycle. But what exactly is Certificate Lifecycle Management? And how can it benefit your business?

The Importance of Centralized Security for Healthcare Providers

As a healthcare administrator, you have an ever-growing list of things to contend with – from increased workplace violence, and the protection of expensive medical equipment and precious medical supplies, to the security of controlled medications, and the safety of a plethora of private and sensitive patient and employee data. Securing a healthcare facility is as complex as it is essential.

TrustCloud Releases World's First Free Security Questionnaire Tool and Compliance Sharing Portal for Startups

TrustShare™ application includes AI-powered security questionnaire responses and a dynamic compliance portal, so startups can pass security reviews and win crucial enterprise deals.

What is retargeting and how can you use it?

Retargeting is a powerful advertising technique that allows brands to reach out to potential customers who have previously interacted with their website or mobile app. It works by using cookies to track users' online behaviour and display to them targeted ads on various websites and social media platforms. Read on and find out how you can use retargeting in your business.

Frequently Asked Questions on the 2023 EU General Court's Pseudonymised Data Ruling

In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as well as the opportunities this new ruling may offer when transferring and accessing data across borders..

Bringing IT & OT Security Together, Part 2: BAS and the Purdue Model

In our first post on using BAS in an operational technology (OT) environment, we provided an overview of a typical converged IT/OT network, the trends that were driving increased cyber risk for industrial asset owners, and a high-level discussion of how BAS can help provide better visibility and protection across the converged environment.

Leveraging XDR to Build Stronger Managed Services

XDR (eXtended Detection and Response) is a leading integrated cybersecurity approach, which improves threat detection and response through integrating multiple data sources and cybersecurity tools and unifying multiple security products into a single operating system. XDR technology is growing increasingly popular. And it’s an opportunity for managed service providers (MSPs) to scale and grow their business.

Risk-based Vulnerability Management: A Bigger Bang for Your Buck

Every five to ten years, major technology shifts change the way that vulnerability assessment and the related IT risk mitigation processes are approached or implemented. What has remained constant is the formula we use to measure risk and thus prioritize and triage vulnerabilities. Risk = (Likelihood of event) * (Impact of consequences) It’s an approach that intuitively makes sense, but there have been two challenges with how this formula has been applied.

A Vision for the Future of Cyber

Lately I’ve been confronted more and more with the notion of holding two opposing ideas at the same time, while being able to accept that they can both be true. This cognitive dissonance surfaced again for me when I was asked to participate in a DeVry University roundtable discussion focused on innovative ways to bridge the talent gap. Spending a virtual lifetime in education, I’m of two minds when it comes to talent and skills.