News

September 17, 2020

How Contact-Tracing Apps Work

Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate.
August 31, 2020

What You Need to Know about the Zero Trust Model

Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here […]
August 27, 2020

Huawei Ban Spreads as 5G Network Approaches Rollout

Trade constraints interfere with mobilization of 5G network platform due to concerns of espionage, semiconductor sales and backdoor security risks.
June 18, 2020

5 Ways to Make Your Virtual Meetings More Effective

Just like with face-to-face meetings, virtual meetings need to be well planned and executed to maximize their usefulness. Here are five ways you can make your […]
April 23, 2020

The GDPR & CCPA Compliant Checklist

While several data privacy laws have come into legislation in certain countries, its safe to globally follow all procedures if your customer database contains address domains […]
February 3, 2020

CCPA is Now in Effect. Are you Compliant?

On January 1st, 2020 the California Consumer Privacy Act (CCPA) went effect for new consumer privacy rights. This empowers consumers with more power against larger businesses […]
December 19, 2019

Company Was Hacked More Than 20 Times Over Nearly 2 Years

For nearly two years, a business was unaware that a cybercriminal was repeatedly hacking its IT systems, which lead to the cybercriminal stealing the personal data […]
November 11, 2019

The E.U. – U.S. Privacy Shield Review is in

The E.U. Commission had their 3rd annual review of the E.U. – U.S. Privacy Shield this October, with the goal to evaluate the compliance of the […]
October 24, 2019

Firefox Mozilla Beta Testing VPN Service

Firefox is testing an extension for browser users that will allow encryption when browsing websites to create a better and secure experience for the user. After […]