Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Exciting New Way to Authenticate on Android 7 phones & Resilient is Ready!

Resilient Network Systems believes FIDO2/WebAuthN has the potential to dramatically improve the security and privacy of identity on the web, while dramatically simplifying the user’s task of registering and authenticating their identity.  WebAuthN became an official WC3 Standard today, March 4, 2019, and FIDO2 is achieving broad industry endorsement and support

Read More >

Compliant Productivity: Embracing “Millennial” Communication Tools While Maintaining Compliance

From employee communication apps like Slack to personal text messages, today’s organizations rely on modern tech for all aspects of their workplace productivity. This shift in how businesses communicate requires a shift in how businesses achieve compliant productivity. More than 40% of Fortune 100 companies today use Slack for internal collaboration and communication. Within these companies, dozens

Read More >

Ransomware Overshadowed by Phishing, But It’s Not Dead Yet

According to several recent surveys, phishing may have surpassed ransomware as the top concern for IT and security managers, and there may not be a single ransomware out there to capture the collective imagination like Locky did in 2016, but don’t be misled—ransomware continues alive and well. Recent targeted Ryuk

Read More >

Ransomware von Phishing übertroffen, aber noch nicht ganz ausgemerzt

Mehreren jüngsten Umfragen zufolge hat Phishing Ransomware als größtes Sicherheitsproblem für IT- und Sicherheitsmanager übertroffen. Keine einzige Ransomware steht so im kollektiven Bewusstsein wie Locky im Jahr 2016. Aber lassen Sie sich nicht täuschen: Ransomware geht es weiterhin allzu gut. Jüngste zielgerichtete Ryuk-Angriffe haben Unternehmen verstärkt ins Visier genommen, wie

Read More >

Data Classification Fail: Data Stolen at Apple Car

Confidentiality Oaths and Stolen Secrets As Bloomberg first reported, an Apple Inc. engineer has been charged with stealing data from the company that contained car secrets for a prototype driverless car. Jizhong Chen had been working for Apple for about six months, signing a strict confidentiality oath upon being hired.  According to another Apple

Read More >

Buying Email Security for Office 365 Has Gotten Harder

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email security? New Buyer’s Guides give a framework and provide a checklist to get it right. Over the last few years, the way businesses use technology has undergone a complete transformation, driven by two major trends

Read More >

Opt-In or Opt-Out: Which Route Should Your Organization Go?

The General Data Protection Act (GDPR) launched a worldwide conversation on data security and consumer data protections. As historical data breaches continue to happen on a way-too-frequent basis, and data privacy legislation expands across the globe, companies are taking a harder look at their privacy policies and their obligations under each

Read More >

CCPA Readiness Checklist: Are You Protected?

he California Consumer Privacy Act of 2018 (CCPA) becomes effective January 1, 2020, but organizations must have certain data protection policies in place now to comply with the new legislation. Modifications to current procedures and a solid understanding of legal requirements are essential to CCPA compliance.    The CCPA increases

Read More >

GDPR in 2019: We’ve Only Just Begun

E-mails, pop-ups, and opt-out messages flooded inboxes and browsers in 2018 as companies began to worry about consent governance and privacy regulation – and the business impact of non-compliance. The General Data Protection Act brought awareness and attention to data privacy across the world. When GDPR went into effect in

Read More >