Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Snowflake PII: Best Practices for Data Protection

As organizations increasingly rely on cloud data platforms, securing PII (Personally Identifiable Information) has become more critical than ever. Snowflake, a robust cloud-based data warehouse, stores and processes vast amounts of sensitive information. With the rise in data breaches and stringent regulations like GDPR and CCPA, safeguarding PII data in Snowflake is essential to ensure data privacy and compliance.

How to Apply the NIST Framework to Your Mobile Security Strategy

If mobile devices aren’t a high priority in your security posture, they should be. About two-thirds of employers consider smartphones “critical to agility and speed of decision-making,” and some would even consider phasing out PCs entirely. As a starting point, consider using the National Institute of Standards and Technology (NIST) cybersecurity framework. This set of guidelines from the U.S.

AI vs. AI: Why fighting GenAI fraud requires a multi-layered approach

If The Terminator, The Matrix, and every other cyberpunk series taught us anything, it’s that you can’t fight the machines with machines alone. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants.

Microsoft Copilot for Security Brings an AI Assist - Even to Your MDR Provider

Artificial intelligence has a significant role to play in cybersecurity, and Microsoft CoPilot for Security is a great example of its promise, with its ability to help even novice security professionals process threat data more quickly and accurately. However, it can also benefit seasoned security pros, including managed detection and response (MDR) service providers.

What is Software-as-a-Service (SaaS) Operations?

In this video, learn the following key points about Software-as-a-Service Operations (SaaS Ops): Resources and social media: Transcript: Organizations rely on SaaS applications more and more to get things done. But with so many specialized apps and different vendors, IT departments can get lost in the cloud. It’s easy to see why -- most organizations use over 100 SaaS apps in their day-to-day tasks. For an IT team, that’s a ton to manage.

Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale

In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices that appear strikingly authentic. Unlike traditional phishing scams that rely on deceptively crafted emails and malicious links, these incidents use genuine DocuSign accounts and templates to impersonate reputable companies, catching users and security tools off guard.

Intelligent Data Classification: Transforming Google Drive Security

Our customers often tell us about how they implement manual classification policies. However, with several hundreds of files created daily, and constant sharing between teams, it becomes impossible to enforce secure sharing and sensitive data protection. Imagine that your sales team just accidentally shared a spreadsheet containing customer credit card details with an external vendor. Or perhaps your HR department stored employee health records in a folder that wasn't properly restricted.

Unveiling the Cloud's Hidden Risks: How to Gain Control of Your Cloud Environment

In today's rapidly evolving digital landscape, the cloud has become an indispensable tool for businesses seeking agility and scalability. However, this migration also brings a new set of challenges, particularly when it comes to security. The increasing complexity and sophistication of cyber threats demand a proactive and comprehensive approach to safeguarding your cloud environments.

How to Keep Your CCaaS Solution Secure

A Contact Center as a Service (CCaaS) solution offers your business the flexibility and scalability necessary to manage customer interactions efficiently. However, like most cloud-based systems, your CCaaS platform needs to be successfully secured to protect sensitive information and maintain regulatory compliance-all to ensure the trust of your customers. Ready to secure your CCaaS solution? Here are 7 steps you can take.