Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Digital identity technologies including blockchain and biometrics are pieces of a bigger p… Read More >
Digital identity technologies including blockchain and biometrics are pieces of a bigger puzzle that empowers users to be in more control of their data. Key Points: Security and privacy practices can be more efficient when people have increased control of their data. Every industry needs to have ef… Read More >
POPIA is changing the way Sout… Read More >
POPIA is changing the way South African organisations handle personal data. Here’s what you need to know. Key Poin… Read More >
The recent high-profile Gmail outage was part of a troubling increase in cloud service bre… Read More >
The recent high-profile Gmail outage was part of a troubling increase in cloud service breakdowns. Organizations need to revise their planning for business continuity. Key Points: December’s Gmail outage was not an isolated incident in the cloud services market. Cloud service outages are inc… Read More >
Reported authentication issue … Read More >
Reported authentication issue results in multiple service outages for cloud giant, causing global productivity disruptio… Read More >
Several developments in 2020 have made in-house e-discovery a higher priority for corporat… Read More >
Several developments in 2020 have made in-house e-discovery a higher priority for corporate counsels. Key Points Heightened regulatory action and increased threats to cybersecurity are contributing to a tougher legal landscape — and COVID has only added to the worry. Data is growing exponenti… Read More >
E-discovery tools, which make … Read More >
E-discovery tools, which make data review more efficient and less expensive, are particularly helpful for financial serv… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
The Privacy Act 2020 introduces breach notification requirements, civil penalties and increased responsibilities for data handlers. Key points: On 1 December 2020, New Zealand enacted tougher privacy laws. The laws apply to any organisation globall…
National privacy policy is on the agenda in Washington, a stricter California policy is approved by voters, and other states are poised to act. Key Points: Many businesses favor a national privacy policy rather than patchwork state policies. The inc…
For the sixth consecutive year, Mimecast Cloud Archive clinched a spot in Gartner’s Enterprise Information archiving Magic Quadrant. Here’s why we earned it and where we’re going next. Cloud archiving is of growing importance, and o…
The COVID-19 pandemic has created new legal risks that make e-discovery more valuable than ever. Key Points: &nbs…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >