Featured
In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...
This article discusses the nature of how cybercriminals attack, from the inside! Cybercriminals use legitimate platforms to infiltrate your data. CyberFOX goes into detail on how you can stop these attacks from surfacing,
This article discusses how cyber- privileges affect access to educational institutions data. Phishing, Malware and Lack of Awareness can play a major factor in poor self-defense against cyber-attacks.
A new era of cyber threats has emerged with the rise of the “enterprising adversary,” as highlighted in the CrowdStrike 2025 Global Threat Report. This new breed of threat actor distinguishes itself through sophisticated and scalable tactics designed to execute attacks with calculated, b...
Druva provides a cloud-native, SaaS-based data protection and cyber resiliency solution that is FedRAMP authorized for US federal government agencies. We offer solutions for Microsoft 365 and endpoints, including features like accelerated ransomware recovery, eDiscovery, legal hold, and centralized ...
View this article to understand how Cortex Cloud stops cyber-threats during their attack, stopping your data from being touched.
Druva provides federal agencies with a cloud-based solution to strengthen their cyber resilience and protect end-user data. Federal agencies choose Druva for its cost efficiency, centralized management, and superior cyber resiliency with air-gapped and immutable backups. Download this resource to le...
As government agencies embrace digital transformation under increasing budget constraints, they face a growing challenge: balancing robust cybersecurity with seamless customer experience (CX). Contrary to common belief, cybersecurity and CX are not competing priorities. Rather, when aligned, they re...
At the Billington CyberSecurity Conference, Tines' Tiffany Kim offered a assessment of the federal government's Zero Trust journey. While agencies have made strides in foundational elements, she stressed that automation and orchestration pose the greatest ongoing challenges. Her insights hig...
Read this blog to learn how DAR helped a telecommunications infrastructure provider based in Silicon Valley from a cyberattack by threat actors. DAR entered the scene and assisted the provider in maintaining safe data practices.