night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Ransomware Sanctions Do They Have Any Impact
Todd Moore
Ransomware Sanctions: Do They Have Any Impact?

Ransomware is one of the most high-profile and high-value cybercrimes that organizations need to watch out for. These attacks have the potential to cause significant financial…

Read More
Thales and Oracle Collaborate to Address EU Sovereign Cloud Challenges
Scotti Woolery-Price
Oracle's EU Sovereign Cloud and Thales CipherTrust: A New Era of Digital Sovereignty

Earlier this year, Oracle launched its External Key Management Service with Hold Your Own Key (HYOK) functionality from…

Read More
How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification
Ludmila Rinaudo
How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Given the pace of data growth and the complexity of hybrid IT environments, the discovery and classification of sensitive data is no simple task. In a…

Read More
Securing the Cloud Frontier
Mukesh Chandak
Securing the Cloud Frontier: Navigating the Complexities of SaaS Data Protection in the Multi-Cloud Era

In the rapidly evolving digital landscape, Software as a Service (SaaS) has emerged as a cornerstone of modern business operations. Valued at nearly $200 billion and projected…

Read More
ENISA 2023 Threat Landscape Report
Romain Deslorieux
ENISA 2023 Threat Landscape Report: Key Findings and Recommendations

The European Union Agency for Cybersecurity (ENISA) recently released its annual …

Read More
Enhancing End User Adoption of Phishing Social share Image
Gregory Vigroux
FIDO, Biometry and Contactless: Enhancing End User Adoption of Phishing-Resistant MFA

The surge in social engineering and phishing attacks seeking to bypass established multi-factor authentication (MFA) methods indicates that organizations must move to phishing-…

Read More