As a whole, cloud service providers are committed to security, regularly adding additional native features to their to Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) offerings. However, while it’s critical that users educate themselves on available controls for each cloud service that they use, it’s important they...

You Don’t Know What You Don’t Know.   This week's guest blog is authored by Arthur van der Wees, Founder of global tech by design law firm Arthur’s Legal. Ransomware IT teams generally use encryption to enable better security and data protection. However, in the hands of malicious parties,...

Compliance and security officers have been here before; allocating critical resources to hit tough deadlines while also working to determine what people, processes, and technology are needed to achieve compliance with a newly imposed regulation. Then, a few years later, the regulations and rules change,...

Privacy watchdogs are no longer taking a lax approach to compliance and data security. With less than 20 months to prepare for the EU’s General Data Protection Regulation (GDPR), some regional regulators are already putting the pressure on local and international businesses handling the personal data of EU...