Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

HTTPS is now over 50% of internet traffic – are we safer?

The era of “HTTPS Everywhere” After years of calling for “HTTPS Everywhere” on the web and encouraging websites to use HTTPS by default, Google officials say the effort has begun to pay off. New data released at the end of October 2016 shows that more than 50% of all pages

Read More >

Resilient and Team win Phase 1 of the Move Health Data Forward Challenge

Resilient along with its partners WebShield Inc., SAFE-BioPharma (@SAFE_BioPharma), Carebox (@CareboxHealth) and InterSystems (@InterSystems) are delighted to announce that we have won Phase 1 of the Move Health Data Forward Challenge.  This prestigious challenge is staged by The Department of Health and Humans Services’ Office of the National Coordinator for Health Information

Read More >

3 Reasons You Need a Virtual Data Room

3 Reasons You Need a Virtual Data Room The top performing businesses in 2016 will perfect the art of connection — in fact, this economy has been labeled the Connection Economy. Consider the largest “taxi company” doesn’t own a car (Uber); the largest “hotel chain” doesn’t own a building (AirBnB); and the

Read More >

HHS announces Phase 1 winners of the Move Health Data Forward Challenge

Proposals designed to help consumers share their personal health data easily and securely The Department of Health and Humans Services’ Office of the National Coordinator for Health Information Technology (ONC) today announced the Phase 1 winners of the Move Health Data Forward Challenge. Winners were selected based on their proposals for using

Read More >

Compliance: Why It Matters and How to Achieve It

Compliance: Why It Matters and How to Achieve It Why Compliance? According to a recent report on data security compliance, industries ranging from retail to healthcare to banking claim that protecting data to comply with corporate policies, industry regulations, or data privacy laws is very important, especially in sectors which are highly

Read More >

Structure Security Conference 2016 – Three Themes

This week, we attended the Structure Security conference in San Francisco’s Presidio Golden Gate Club. It was billed as a conference that “will highlight the best practices that security professionals are using to protect some of the world’s largest companies and institutions, and examine the future of security products, services,

Read More >

Attorneys: Is Your Information Governance Rock Solid?

Attorneys: Is Your Information Governance Rock Solid? Great architecture begins with a rock-solid foundation. Builders envision elaborate structures, but when the foundation is not firm, trouble is sure to follow. At best, a building leans; at worst, it completely topples over. In the Information Age, businesses, especially law firms, don’t

Read More >

(IN)Secure Magazine: Hyper-Evasive Threats are Killing Sandboxing

A new generation of hyper-evasive malware is defeating legacy sandboxing technology and driving new security countermeasures underpinned by the elastic processing capacity of the cloud, as Cyren’s VP of Threat Research explains in an article in the September issue of (IN)SECURE Magazine.  In the article, Sigurdur Stefnisson reviews the evolution

Read More >