A Prominent Place at the Table for Rural Technological Advancements


When the general public thinks about today’s exciting technological breakthroughs, the imagery that springs to mind is unlikely to be a crowded pigpen in China or yam fields in the farmland of Nigeria. Yet, rural areas are the frontlines for some of the most important gains technology is enabling in modern society. The growing imprint [...]

Policy Q&A: The Basics of the NIS Directive


In this Q&A, Danielle Kriz, senior director of Global Policy, and Fred Streefland, senior manager of Product Marketing for EMEA, cover the basics of the EU’s Network and Information Security Directive and what it might mean for organizations. Fred: Let’s talk about a new cybersecurity law in the European Union, the Network and Information Security (NIS) [...]

Five Keys for Adaptive IT Compliance


The fluid technology and regulatory landscape calls on IT compliance professionals to be more flexible and proactive than in the past to remain effective, according to Ralph Villanueva’s session on “How to Design and Implement an Adaptive IT Compliance Function,” Monday at the 2018 GRC Conference in Nashville, Tennessee, USA. The IT compliance function serves as an [...]

An Overlooked Upside to Cybersecurity Roles – They’re Fun!


Recent surveys and studies have emerged that show interest in cybersecurity as a potential career field at uncomfortable lows. In fact, a recent ProtectWise report showed that only 9 percent of millennials indicate cybersecurity is a career they are interested in pursuing at some point in their lives. This disturbing finding has far-reaching potential consequences in a [...]

Tech Docs: Five New Features in the Traps Management Service


That’s right! The August release of the Traps management services introduces five new features designed to simplify endpoint management and security event investigation: 1. Clickable Dashboard—From the Dashboard you can now jump to a filtered list of endpoints that share any of the following characteristics: Platform operating system License status (to view a list of all licensed [...]

Lessons from the Reddit Breach


An attacker gained access in June to Reddit users’ data, including usernames, passwords, email addresses and private messages from 2005-2007. The attacker also gained access to more recent data, including current usernames and emails. This data allows hackers to try to break into sites where users might still be using the same passwords. Although the compromised passwords [...]