The Devastating After-Effects of a Data Breach
December 4, 2019, Data Security
Are you confident that your organization would not experience a data breach? If I were… Read More
What is a Credential Stuffing Attack and How to Prevent Them
November 15, 2019, Data Security
Credential stuffing poses a growing threat as it leverages compromised user credentials to breach systems.… Read More
What is the NYDFS Cybersecurity Regulation and How Lepide Helps
November 1, 2019, Data Security
Back in 2017, the New York State Department of Financial Services (NYSDFS) brought forward a… Read More
Keeping Unstructured Sensitive Data Secure in the Cloud
October 8, 2019, Data Security
77% of companies use at least one cloud-based service, according to an article by Forbes,… Read More
Common File Activity Monitoring Use Cases
September 16, 2019, Data Security
Monitoring file activity is not as straight forward as it sounds. After all, in order… Read More
How to Prevent Phishing Attacks: 10 Ways to Avoid Them
September 6, 2019, Data Security
Phishing attacks continue to be the bane of security teams across the globe. Cybercriminals exploit… Read More
