Category: Crypto/Security

Business Email Compromise: How to Minimize Risk

Cybercriminals aren’t slowing down and today’s organizations need a proactive approach to secure their communications. Business email compromise (BEC) exploits companies to financial risks and losses with criminals posing as legitimate vendors or employees to commit fraud. An FBI alert from 2020 noted that BEC exploits cost U.S. businesses more

Read more →

Top Causes for Data Breaches and What Enterprises Can Do

The cost and damage a data breach wreaks on enterprises is often ambiguous, and you will only understand the real impact way down the line. The fact remains that data breaches harm your brand and may leave you with lasting effects, forcing you to try to rebuild trust with your

Read more →

Key Strategies for Secure Collaboration and Compliance

Due to the COVID-19 pandemic, more and more employees are working from home – and remote collaboration presents a unique as well as ongoing set of challenges. Not only must remote employees have real-time access to one another, they also need to access the same files and data they would

Read more →

The Pros and Cons of Threat Information Sharing

Many organizations today are sharing information about cybersecurity threats, vulnerabilities, and solutions. On the surface, this sounds like a good idea – you learn more about potential threats and solutions while sharing your experiences with similar companies. But when you share this information, are you producing new threats to your

Read more →

The 3 Biggest Changes to U.S. Cyber Policy Since SolarWinds

The SolarWinds hack was a major attack that affected thousands of companies as well as multiple government agencies. The size and nature of the attack demanded a strong response, which the government has provided in the form of several important changes to United States cyber policy. Understanding the SolarWinds Attack

Read more →

Best Practices for Cybersecurity Compliance

Ensuring cybersecurity compliance is challenging. You need to decipher all the regulatory acronyms and understand all the governmental and industry regulatory requirements. You also need to determine which ones apply to your business or organization and then ensure that you conform to all the various regulations. It’s tough to keep

Read more →

Why End-to-End Encryption is a Must-Have for Enterprises

A growing number of enterprises are turning to end-to-end encryption to secure their data and communications. End-to-end encryption, also known as E2E, builds on traditional encryption-in-place to ensure that data and communications stay secure even when in transit. It’s a must for any enterprise with a growing remote workforce.  What

Read more →

Key Steps to Achieving Robust Threat Intelligence

Threat intelligence involves collecting, analyzing, and disseminating data about malicious actors, their behavior, and their methods. This information is then used to strengthen an organization’s defenses, expose vulnerabilities, and protect against security threats. Threat Intelligence is an increasingly vital part of the corporate security landscape. To best protect your company

Read more →

Secure Collaboration for the Federal Government

Wickr and Wickr Enterprise is the only end-to-end encryption (E2EE) in a zero knowledge and zero trust architecture that is developed, maintained and controlled in the United States specifically developed to support government enterprise deployments. NSA and CISA released a briefing for safely advising the selection of collaboration services and

Read more →