Top Data Security Challenges and How to Address Them

Top Data Security Challenges and How to Address Them

Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Whether data security worries center around internal security lapses or stem from the harsh reality of being targeted by those with malicious intent,...
Protecting Data at Rest vs Data in Motion

Protecting Data at Rest vs Data in Motion

Protecting sensitive data such as personally identifiable information (PII), intellectual property, or healthcare data, has become a requirement for most businesses collecting and processing these types of data. Whether it’s to comply with data protection legislation...
Breaking the money mule’s back

Breaking the money mule’s back

In any bank fraud scheme, the criminals need to move funds to clean accounts or cash them out, and that means laundering. To cover their tracks, they transfer funds, first to money mules and thence somewhere else. At RSA Conference 2021, representatives of several...