
The Devastating After-Effects of a Data Breach
December 4, 2019, Data Security
Are you confident that your organization would not experience a data breach? If I were… Read More

What is a Credential Stuffing Attack and How to Prevent Them
November 15, 2019, Data Security
Credential stuffing poses a growing threat as it leverages compromised user credentials to breach systems.… Read More

What is the NYDFS Cybersecurity Regulation and How Lepide Helps
November 1, 2019, Data Security
Back in 2017, the New York State Department of Financial Services (NYSDFS) brought forward a… Read More

Keeping Unstructured Sensitive Data Secure in the Cloud
October 8, 2019, Data Security
77% of companies use at least one cloud-based service, according to an article by Forbes,… Read More

Common File Activity Monitoring Use Cases
September 16, 2019, Data Security
Monitoring file activity is not as straight forward as it sounds. After all, in order… Read More

How to Prevent Phishing Attacks: 10 Ways to Avoid Them
September 6, 2019, Data Security
Phishing attacks continue to be the bane of security teams across the globe. Cybercriminals exploit… Read More