night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
How Ransomware attacks leverage unprotected RDPs and what you can do about it
Alexander Basin
How Ransomware attacks leverage unprotected RDPs and what you can do about it

As mentioned in my colleague Charles Goldberg’s blog post earlier this year, “Stop Ransomware in its Tracks with Strong…

Read More
Superior OS-Level Data Protection
Rajesh Gupta
Superior OS-Level Data Protection

Data is everywhere and it is everything to an organization. In this digital age, data is not just limited to collecting personal information, medical history or financial…

Read More
Robust Access Management Can Protect Asia Pacific Organizations Against Remote Working Cyber Threats
Rana Gupta
Robust Access Management Can Protect Asia Pacific Organizations Against Remote Working Cyber Threats

Cloud applications are a target As organisations continue to adapt in the current circumstances, the cloud is becoming a crucial component of business continuity and…

Read More
Prescription for securing internet-connected devices in healthcare
Ashvin Kamaraju
Prescription for securing internet-connected devices in healthcare

As we continue to address the importance of good cybersecurity practices during National…

Read More
In a Year Like No Other, National Cybersecurity Awareness Month is the Time to Consider the Future of Data Security
Tina Stewart
In a Year Like No Other, National Cybersecurity Awareness Month is the Time to Consider the Future of Data Security

IT security teams continue to face a year like no other and the plot twists of 2020 are careening toward a cliffhanger that will push into the new year. Normally during…

Read More
Multi-factor authentication offers effective security, but not all solutions are created equal
Danna Bethlehem
Multi-factor authentication offers effective security, but not all solutions are created equal

Reports published by Proofpoint…

Read More