Featured Blog
Securing the Email Flow: Implementing Encrypted Email in Microsoft 365, Exchange, and Onward
Most information security and IT teams know the risks involved when sending unencrypted email. However, outside of those groups, it is still not clear to many email users why encrypting sensitive email messages is so important and the extent of risks associated with unencrypted email communications. Encrypted email adoption still remains low across many industries. […]
Breaches, Cyberattacks, IT, Retail
What Happens to All the Credit Card Numbers Stolen in Data Breaches?
Breaches, Cyberattacks, Government, Health care
State Targets: 5 Major Data Breaches in October 2014
Breaches, Cyberattacks, Events, Financial Sector, Malware, Retail, Vulnerabilities