night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Checklist for Getting Cyber Insurance Coverage
Danna Bethlehem May 12, 2022
Checklist for Getting Cyber Insurance Coverage

As cyber criminals mature and advance their tactics, small and medium businesses become the most vulnerable because they lack the capacity – staff, technology, budget - to…

Read More
Is the demise of OTP authentication imminent
Chris Martin May 10, 2022
Is the demise of OTP authentication imminent?

Digital transformation and the increasing reliance on remote business continue to accelerate the adoption of new …

Read More
One Year Later: What Have We Learned Since the Colonial Pipeline Attack
Todd Moore May 9, 2022
One Year Later: What Have We Learned Since the Colonial Pipeline Attack

It is hard to believe that it has already been one year since the…

Read More
Key Repatriation, the first step in re-establishing Cloud Data Digital Sovereignty
Brian Grant May 5, 2022
Key Repatriation, the first step in re-establishing Cloud Data Digital Sovereignty

Repatriation is the process of returning an asset, an item of symbolic value, or a person—voluntarily or forcibly—to its owner or their place of origin or…

Read More
5 Lessons Star Wars Can Teach Us About Cybersecurity
Liz Kelly May 4, 2022
5 Lessons Star Wars Can Teach Us About Cybersecurity

A long time ago – in 1977 to be precise - in a film theatre far, far away, a film called “Star Wars” was released, which took the world by storm and changed sci-fi, cinema, and…

Read More
Anatomy of a Quantum Attack
April Burghardt April 28, 2022
Anatomy of a Quantum Attack

Next-generation cyberattacks are often summarized as ransomware, man-in-the-middle, brute-force, phishing, insider, or malware attacks. Each present a unique set of challenges…

Read More