<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

What is Penetration Testing?

A penetration test or pen test is a simulated cyber-attack against computer systems, application systems, and IT infrastructure to discover loopholes. These simulated cyber-attacks come in diverse forms with the intent of breaching a system through its servers, web or mobile applications, and other endpoints. The purpose of pen testing is to discover exploitable vulnerabilities in a controlled setting before cybercriminals take advantage of them.

What is the Zero Trust Framework?

Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is widely adopted, with leading researchers at Gartner, Microsoft, and Google all developing and implementing their variations of Zero Trust frameworks while keeping the core concept intact.

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.

Why having a SIEM is Essential for Remote Work

The share of the workforce working remotely and the percentage of freelancing workers was steadily rising worldwide, even before the spread of the COVID-19 virus. Working entirely from home or performing specific tasks remotely is already a routine across organizations of all sizes and all industry verticals. The spread of the coronavirus only speeds up the process of shifting toward a more flexible work environment in which work from home plays an increasingly important role.

Popular MFA Solutions

Multi-factor authentication (MFA) is a method and technology to verify a user’s identity requiring two or more credential category types for the user to be able to log into a system or make a transaction.

How to Celebrate Records and Information Management Month

It's April, and that means it's Records and Information Management Month. While it's not the sexiest topic, maintaining and organizing your business's records is an essential task that often gets put on the back burner.

Successful Password Policies for Organizations

Learn some of the basic considerations when establishing a strong password policy for your organization. Find out some of the best practices and industry standards when it comes to user access and a password policy framework. Most places of business require that their employees access their facilities by using a key or key card. In many ways, passwords are the keys by which employees access their workplace network. With physical office keys or card readers, proper policies and procedures must be implemented to ensure that unauthorized access does not occur. The same holds true with successful password policies for organizations.

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security