night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
The Changing Threat Landscape for Retailers
Lynne Murray
The Changing Threat Landscape for Retailers: Why is data security working harder than last year?

It’s the 2025 holiday shopping season, and retailers everywhere are geared up for the rush of online customers. From late November to January, which includes Black Friday,…

Read More
Are Defense Contractors Ready for the Cybersecurity Maturity Model Certification?
Marcelo Delima
Are Defense Contractors Ready for the Cybersecurity Maturity Model Certification?

If you’re a defense contractor or subcontractor, 2025 isn’t just another year—it’s the year the Cybersecurity Maturity Model Certification (CMMC) becomes a contract-shaping…

Read More
Scotti Woolery-Price
Scotti Woolery-Price
Unlocking Cloud Security: AWS Key Rotation in CCKM

How Automated Key Management Empowers Customers and Elevates Data Protection. In today’s cloud-driven world, organizations are continually searching for powerful…

Read More
The Power of the Platform: Data Security at its Best
Lynne Murray
The Power of the Platform: Data Security at its Best

The latest IDC report on data security raises an important point: if organizations are looking to level up their old data security solutions, now might be the time for a…

Read More
AI is the New Insider Threat
Jon-Rav Shende
AI is the New Insider Threat: Rethinking Enterprise Security in the Digital Age

Artificial intelligence (AI) is no longer just a passive tool. It’s an active insider interpreting data, executing workflows, automating decisions, accessing sensitive data,…

Read More
Unified Access for a Hybrid World: Modern FIDO Authentication for On-Premises Applications
Pooja Jain
Unified Access for a Hybrid World: Modern FIDO Authentication for On-Premises Applications

Enterprises today face a tough balancing act: protect legacy and on-premises applications while ensuring seamless access across hybrid environments. Traditional MFA has reached…

Read More