<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

How to Celebrate Choose Privacy Week

Choose Privacy Week, first observed by the American Library Association Office for Intellectual Freedom (OIF) in 2010, is an initiative that invites the public to have a conversation about privacy rights in a digital age. The campaign gives the public the tools they need to educate and engage , and gives them resources to think critically and make more informed choices about their privacy.

Why UEBA Software is Necessary for the Remote Workforce

When an organization has a highly remote workforce or shifts its operations to remote working, even temporarily, they could be opening their network to many risks. One way to mitigate them is by implementing UEBA software. UEBA stands for User and Event Behavior Analytics or User and Entity Behavior Analytics, depending on who you ask.

Why Multi-Factor Authentication is Critical Right Now

Emergencies such as natural disasters or pandemics force organizations to take measures for establishing work-from-home procedures. One of the first security measures organizations must implement for remote work is multi-factor authentication (MFA). Multi-factor authentication is a method to protect access to corporate networks and business-critical systems, both on-premises and remotely. It requires an employee or a partner to provide at least two authentication factors to confirm his or her identity and login credentials.

VIDEO: Remote Workforce Roundtable Pt. 2 - Endpoint Security & EDR

In part one of our Remote Workforce Roundtable, we spoke to the larger cybersecurity trends at hand with remote working and security vulnerabilities. This time I sat down with Greg Foss from VMware Carbon Black for a more endpoint-focused discussion on remote work.

The Benefits of NGAV and EDR for Remote Users

In this new remote workforce world we now find ourselves in, the threat landscape has shifted once more. For many organizations this if the first time that they find their workers outside the comfort of the office and its security safeguards and thrust into the unknown of the home office life. This shift opens new areas of vulnerability to organizations that they have not had to face before. The change to a remote workforce is stretching security professionals and requires that they are able to maintain the same level of protection remotely that they had previously been providing within the office environment for their users.

Partner Digest: Week of 5/4/20 - Gartner on MSS Landscape & RSA Archer Solutions

Datashield Partner Digest for the Week of May 4th, 2020 - Highlights: Changes in the MSS landscape according to Gartner plus integrated risk management solutions via RSA Archer.

How a SOC Handles Credential Harvesting

By Nick Sandin, Security Analyst and contributing author Brandon Doty, SOC Manager Dealing with credential harvesters has its perks. Day in and day out I get to personally observe how sophisticated a phishing website can be. Some websites are so elaborate that only a trained analyst can identify them, while others are so obvious no one in their right mind would fall for it. Either way, if it looks suspicious just follow the “POST”.

Partner Digest: Week of 4/27/20 - Ransomware attacks & Zoom's New Security Threat

Datashield Partner Digest for the Week of April 27th, 2020 - Highlights: VMware Carbon Black report that Ransomware attacks are up and newly discovered security threat with Zoom.

VIDEO: Remote Workforce Roundable

I recently interviewed leaders from a few of our partners and our Chief Information Security Officer (CISO), Jeff Marshall, to talk about the recent COVID-19 quarantine and impact to a newly expanded remote workforce.

The Dark Realities of Building a SOC

Today, a Security Operations Center (SOC) is the heart of many industry-leading organizations’ security infrastructures. While many organizations seek to stay ahead of the curve and take ownership of building a SOC from the ground up, it just isn’t cost effective.

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security