When Malicious Actors Turn Your Own Messages Against You When a data breach occurs, most companies contact their customers by email to inform them of what happened, which information may have been compromised, and what the company is doing to … Read More
Large enterprise and SMBs
Less than 10% of data breaches are made public
Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More
Firework: Digital Risk Protection Product Brief
Firework – Product Brief: Digital Risk Protection Download the product document
Top 5 human errors that lead to data breaches
Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More
Solution Brief: Detect Technical Data Leaks
Solution Brief: Technical Data Leaks Detection Download the product document
When Private Photos Don’t Stay Private for Long
When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content benefits from end-to-end encryption, … Read More
How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting
How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting Download the PDF version of the report Protect your digital assets and infrastructure not only by following basic security guidelines, but also by understanding the threat landscape. Download … Read More
Who Lets Access Keys Out?
Who Lets Access Keys Out? Technical data leakage takes on many forms, but often revolves around the publication of passwords or cloud services’ access keys on the internet. Many technical data leakages are not the result of a malicious actor. … Read More
Flare Systems Overview
Flare Systems Overview Download the product document
Webinar Replay: Who is Digital Risk Protection For?
Who Is Digital Risk Protection for? David Hétu, Chief Research Officer at Flare Systems, defined what Digital Risk Protection is and who needs it most. Who is Digital Risk Protection for? The short answer is everyone who stores personal and financial information … Read More