Tech needs women: an interview with the women leading Fastmail

As we discovered in our Women in Tech panel earlier this year, it’s important to show women succeeding in male-dominated industries, like technology/security, and to talk about how men can help create space for others in the workplace. We’ve previously highlighted our women-led Security team and now want to continue sharing stories about women in leadership by introducing you to two leaders that are helping create space for women and non-binary people in the tech industry.

UPDATE 7: The Data Privacy Periodic Table

Since our last update in January, there has been an unprecedented amount of activity in the data privacy world. And yes, we probably do say that every time! New laws have passed in Virginia and Colorado. The UK’s post-Brexit EU adequacy was confirmed. Plus of course, the EU’s significant changes to Standard Contractual Clauses and the reawakening of the debates over Identity Verification, especially in the context of social media.

Cloud antivirus - How essential is it for your business?

Cloud-based solutions are the holy grail for the modern day business. The convenience of being able to access enterprise data and tools any time, any place, and from any device has been a key ingredient for business success - particularly if you’re in the middle of a global pandemic. But, there are plenty of unspoken risks that come with the use of an always-connected workforce.

Appknox - Highest rated mobile application security solution

Launching a mobile enterprise application is no easy feat and one minor security breach can undo all your hard work in no time. With the right security platform, you can detect and fix security vulnerabilities without losing sleep. Say hello to Appknox, a plug-and-play security solution that secures your mobile enterprise applications in less than 60 minutes. Rated the highest in security products in Gartner and being a high performer on G2crowd for SAST, we set ourselves apart from our competition by allowing you to integrate your SDLC with all project management and CI-CD toolchain.

Corelight Smart PCAP

Security teams can save up to 10x the packet retention period at 50% the cost compared to full packet capture! Sounds too good to be true, right? It’s not! With powerful, yet easy-to-use pcap levers we let security teams capture just the packets needed for investigations, and correlate them with our alerts and logs, and make packets 1-click retrievable. With Smart PCAP you get months, not days' worth of packet visibility.

Spectra Alliance Helps Enable Zero Trust

Zero Trust is not something you purchase. Zero Trust is a security strategy you build out using the working assumption that there are no safe network zones, no perimeters, no safe users, and no safe devices. The Spectra Alliance helps enable a Zero Trust model across the scope of six elements including applications, data, networks, infrastructure, identities, and devices.

Why Cybersecurity is Critical to Maintaining HIPAA Compliance

When exploringhttps://securityscorecard.com/admin/entries/blog/154640?draftId=2332&fresh=1# top network security breaches, many think of the obvious: banks or large consumer institutions. However, healthcare organizations are on the rise as a top target for hackers, with the number of data breaches rising 36% in the second half of 2020.

Mapping the Attack Surface for Insurance Applications

As insurance organizations look to attract and engage customers, the growing use of web applications has increased their cyber exposure and the risks of cyberattacks. In this benchmark study, we analyzed the attack surface of the top 10 insurers in Europe to highlight the common attack vectors and security weaknesses that could be exploited – from page creation method to vulnerable components – and our top tips for reducing web application security risks.