night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
The Hong Kong Stablecoins Bill
Ray Law
The Hong Kong Stablecoins Bill: Securing Trust in a Regulated Digital Future

Hong Kong is fast becoming a global hub for Web3 and digital assets. However, as interest from banks, stablecoin issuers, and crypto trading platforms grows, so does the need…

Read More
Cloud Encryption What Your Cloud Provider Covers
Brian Robertson
Cloud Encryption: What Your Cloud Provider Covers -- and What’s Still on You

The Thales 2025 Data Threat Report revealed that cloud assets such as SaaS applications, cloud-based storage, and cloud infrastructure…

Read More
DSPM Strategy Quote Thumbnail
Todd Moore
DSPM Is Only as Strong as Your Data Protection Strategy

While DSPM brings much-needed visibility and insight into where data lives, who’s accessing it, and how it’s being used, posture management without protection is like building…

Read More
A Risk-Based Approach to Securing Data in Microsoft 365 with Copilot
Scotti Woolery-Price
A Risk-Based Approach to Securing Data in Microsoft 365 with Copilot

Enhancing Security and Maintaining Control of Data used by CopilotAs an experienced CISO or data protection specialist, you know the critical importance of…

Read More
With File Activity Monitoring
Steve Years
Unstructured Data Management: Closing the Gap Between Risk and Response

The world is producing data at an exponential rate. With generative AI driving 90% of all newly created content, organizations are overwhelmed by an ever-growing data estate.…

Read More
Secure Your Data Throughout its Lifecycle
Randy Hildebrandt
Secure your data throughout its lifecycle with End-to-End Data Protection

To most of us, perhaps unknowingly, data is everything. Whether it is a groundbreaking idea, sensitive health records, or confidential business strategies, data underpins both…

Read More