Inside the Briefcase






Briefcase Highlights


Tag Archive

Free Report: “How Supply Chain Attacks Work, and How to Stop Them”

May 3, 2023 No Comments

Security leaders are scrambling to assess the security of their supply chains. Here are some ways to protect applications and third-party partnerships from attack

Examples of Insider Threats: What you need to know

April 12, 2023 No Comments

Insider threats are a major worry for businesses of all sizes. Those with access to an organization’s network, data, or assets often execute these attacks. While many companies highlight external threats, internal risks can be equally destructive and, in some cases, more difficult to identify and avoid. Insider threats can come in different shapes, and their objectives can vary. This blog will discuss some of the most common types of insider threats and what businesses may do to mitigate the danger.

How Blockchain Technology is Transforming Business Practices and Applications

December 20, 2022 No Comments

Although Blockchain might not appear to impact our daily lives, it has undoubtedly impacted how many businesses handle their operations and applications. By enabling secure and efficient transactions, blockchain technology has revolutionized the way businesses transfer money and data. This article will explore how Blockchain technology is transforming business practices and applications.

The Drawbacks of a Frequent Password Reset

December 15, 2022 No Comments

Today, we are increasingly more aware of cybersecurity, whether it’s about our social media accounts, e-mails, or even banking apps. Passwords are still our only and, therefore, the best option to protect our online accounts and privacy. ExpressVPN’s study investigates how often people change their passwords. The results show that they spend several hours a year on that task.

Addressing GDPR Compliance

September 28, 2022 No Comments

This webcast summarizes several key requirements of the GDPR and maps them to Oracle Data Security features.

Byos Releases Free Assessment Tool to Provide Companies with Tailored Network Security Recommendations

September 20, 2022 No Comments

Byos announced today the release of the Byos Network Security Maturity Assessment: a free tool that details actions and technologies to improve an organization’s security posture. Developed by a team of network security industry veterans and consultants, the tool scores a company’s current network security maturity via a 15-minute survey and provides a tailored set of recommendations that can be used to develop priorities, action plans, long-term budgets, and more.

Tags: , , , News

7 Ideas to Improve Network Security In Healthcare

January 24, 2014 No Comments

Watch this webinar to learn best practices from healthcare customers and seven ideas that will help improve your network security investments.

ADVERTISEMENT

EASEUS