Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Map Personal Information for CCPA?

Businesses need to map personal information now to have full control and insight into all customer data, or Personal Information (PI) as defined by the CCPA. How Do I Map Personal Information in My Business for CCPA? To comply with the CCPA’s definition of Personal Information, businesses must build a full map of

Read More >

Top 20 Brands Targeted for Yuletide Phishing

As the final crush is on for Christmas shopping, keep in mind that online retailers and financial sites are still the most popular targets for phishing, according to recent analysis by the Cyren security lab. To learn which brands were the most frequently targeted by phishers, Cyren analysts extracted about

Read More >

What Does Personal Information (PI) Mean Under CCPA

The California Consumer Privacy Act (CCPA) is set to be indoctrinated on January 1st, 2020, and will change the consumer privacy landscape across the United States of America. Largely inspired by the General Data Privacy Regulation (GDPR), the CCPA is very similar in its quest to move control of consumer data back

Read More >

Why CCPA Needs Workflow

Its January 1st and your first 5 CCPA SAR’s just came in from data; how do you turn this around? What does it look like? The answer is Workflows.  We learned with GDPR that DSAR’s need to be handled correctly, or there are massive consequences, that much is obvious. But

Read More >

CCPA – Opportunities For Success

The data governance landscape is rapidly changing across the United States every day – and on January 1st, 2020, a law that aims to provide consumers with more control and power over their personal information will be enacted. The California Consumer Privacy Act (CCPA) will change how business is done in the

Read More >

Exploiting CAPTCHA: The Latest Evasive Phishing Tactic

The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) has been used in commercial applications since the early 2000s. As its name suggests, it is a mechanism for ascertaining that a real human is performing an action at a web site. CAPTCHA is generated by distorting

Read More >

Suspected BEC Campaign Targeting Banks

In the past week we’ve been receiving reports of different—but seemingly related—email malware campaigns targeting banks in both the US and Europe, specifically in the form of Excel Workbooks containing a malicious macro being sent as an attachment to emails. What’s interesting is that even though the email themes used

Read More >

CCPA vs. GDPR

Do you know how the California Consumer Privacy Act stacks up to Europe’s General Data Protection Regulation?

Read More >