Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Reported authentication issue results in multiple service outages for cloud giant, causing… Read More >
Reported authentication issue results in multiple service outages for cloud giant, causing global productivity disruption. Were you sweating in your pajamas on Monday as you realized that not only was your Google Nest thermostat down – nearly every service Google provides was in fact down? You… Read More >
Several developments in 2020 h… Read More >
Several developments in 2020 have made in-house e-discovery a higher priority for corporate counsels. Key Points Height… Read More >
E-discovery tools, which make data review more efficient and less expensive, are particula… Read More >
E-discovery tools, which make data review more efficient and less expensive, are particularly helpful for financial services firms. Key Points: The financial services sector faces unique challenges, ranging from massive data proliferation to a vast and complex regulatory landscape. Faced with a mul… Read More >
The Privacy Act 2020 introduce… Read More >
The Privacy Act 2020 introduces breach notification requirements, civil penalties and increased responsibilities for dat… Read More >
National privacy policy is on the agenda in Washington, a stricter California policy is ap… Read More >
National privacy policy is on the agenda in Washington, a stricter California policy is approved by voters, and other states are poised to act. Key Points: Many businesses favor a national privacy policy rather than patchwork state policies. The incoming Biden administration is open to instituting … Read More >
For the sixth consecutive year… Read More >
For the sixth consecutive year, Mimecast Cloud Archive clinched a spot in Gartner’s Enterprise Information archivi… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
The COVID-19 pandemic has created new legal risks that make e-discovery more valuable than ever. Key Points: &nbs…
Elections in California and across the country could rewrite data privacy laws and revive national data privacy legislation now circulating on Capitol Hill. Key Points: Californians are poised to vote on Proposition 24, which would strengthen …
Shifting data privacy laws and regulations could change how Canadian companies can use U.S.-based cloud services and data processors. Key Points: New policies concerning data residency and localization may affect how Canadian companies share data wi…
A tidal wave of ransomware attacks is inundating the U.S., exploiting a lack of cyber resilience at many of the country’s bedrock institutions. Key Points: A ransomware strike has crippled UHS, an $11.4 billion Pennsylvania-based health system…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >