E-commerce and Retail

Malicious Actors Show Little Interest in Automotive Source Code Leak

Malicious Actors Show Little Interest in Automotive Source Code Leak Technical data leakage strikes again, this time affecting a major manufacturer in the automotive industry. Bleeping Computer reported this week that a misconfigured Git server has leaked source code from … Read More

Rethinking Digital Risk Protection and Mitigation

Rethinking Digital Risk Protection and Mitigation A global pandemic, a fast-growing remote workforce, and reliance on misconfigured cloud-based services are expanding the threat landscape your company is facing. Malicious actors are taking advantage of digital transformation to compromise corporate security … Read More

What do fraudsters want for Christmas in 2020?

What do fraudsters want for Christmas in 2020? ‘Tis the season to be jolly, even though this year has been a challenge, to say the least. While some are thinking about end of year reports and others are looking ahead … Read More

Can a Data Breach Help Protect Your Company?

Can a Data Breach Help Protect Your Company? Cloud services, especially those related to communications, have massively been adopted by corporations, as they have shifted to a remote workforce this year. The poster child for this trend, Zoom, now has … Read More

Thought Reporting a Data Breach Was Easy? Think Again.

When Malicious Actors Turn Your Own Messages Against You When a data breach occurs, most companies contact their customers by email to inform them of what happened, which information may have been compromised, and what the company is doing to … Read More

data leak

Less than 10% of data breaches are made public

Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More

Firework: Digital Risk Protection Product Brief

Firework – Product Brief: Digital Risk Protection Download the product document

Top 5 human errors that lead to data breaches

Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More

Solution Brief: Detect Technical Data Leaks

Solution Brief: Technical Data Leaks Detection Download the product document

When Private Photos Don't Stay Private For Long

When Private Photos Don’t Stay Private for Long

When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content  benefits from end-to-end encryption, … Read More