Blog

Insights on Data Security & Threat Intelligence

Survey Finds Security Investment Increasing, But Not Security

The second-annual Cyren-Osterman Research U.S. security survey shows a significant disconnect between rising IT security spending and a low level of confidence in current protection, among many topics covered in the 24-page report, IT Security at SMBs: 2017 Benchmarking Survey, available for free download. Security Budgets Up Sharply On average,

Read More >

Chris talks Legal Tech with Lawyers Weekly

Chris talks Legal Tech with Lawyers Weekly From Lawyers Weekly: The CEO of a start-up specialsing in enterprise discovery shares the story of how his company has matured on the track to innovation to join the Nextlaw portfolio of companies endorsed by Dentons.Read the article

Read More >

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

Read More >

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

Read More >

Corporate Compliance Insights Guest Post

Corporate Compliance Insights Guest Post 3 Hidden Traps Associated With GDPR Avoiding the Challenges to Ensure Compliance From the Corporate Compliance Insights Blog:Many companies aren’t ready for the looming GDPR deadline, and they face real hurdles in getting to “compliant.” FileFacets, an enterprise analytics and privacy compliance platform that makes

Read More >

Ransomware-as-a-Service Is Making Crime Easy

It shouldn’t surprise anybody to learn that cybercriminals are taking their lead from some established business service models. We wrote about Botnet distribution services here, and the concepts apply equally to other corners of the malware “industry.” In February 2016, the “Cerber” ransomware first appeared in the form of Ransomware-as-a-Service

Read More >

Best Practices for Stopping Ransomware

With the recent return of Locky and continued growth of ransomware and ransomware-as-a-service, there is a good chance you personally know an individual or company that has experienced such an attack or another similar threat. If you work in the computer or security industry, you might also often be asked

Read More >

What is PII? What Should We Do About It?

What is PII? What Should We Do About It? Dreams and fantasies are often referred to as “pie in the sky” thinking—nice to ponder, but, realistically speaking, not likely to happen. A generation ago we would have thought the digitization of info would usher in a Utopian paperless age when

Read More >

New Cyren Threat Report: The Malware Wars

If you want to know what a cyber-war looks like, read the news. And if you want to get up to speed quickly and try to make sense of all that news, I recommend downloading our new special report on malware, with a special nod to the included interview of

Read More >