The Securetain team recently completed a 6-part series as a guide for organizations to leverage GDPR preparation for CCPA. The Malware/Ransomware 4-part…
In part I, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, the…
In part, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, we explored…
You must have heard the following cloud encryption and key management buzz words: BYOK – Bring Your Own Key BYOV – Bring…
In the last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security…
Course Content What is SARS-COV-2 (COVID-19)?How to Protect Yourself?Deciding to Reopen the Business During COVID-19Worker Exposure Risk to COVID-19Steps to Reduce Workers’…
Please check earlier blogs “Easy Fix Remote Work Cyber Security Checklist”, “Management, Director and Employee Responsibilities”, “Cybersecurity COVID 19 Guidelines for Small…
The article published two weeks ago titled “Coronavirus (COVID-19) Guidance for Small and Large Businesses” listed the important points and resources the…
The article published two weeks ago titled “Coronavirus (COVID-19) Guidance for Small and Large Businesses” listed the important points and resources the…