Research

Balancing security versus access in your Salesforce tenant

Balancing security versus access in your Salesforce tenant

Balancing security versus access in your Salesforce tenant  When it comes to sensitive data, there can be little more sensitive than an organisation’s customer data Not only is high availability critical for the operation of their sales activities, but the data needs...
The evolution of deception technology

The evolution of deception technology

The evolution of deception technology  Cybercriminals regularly use deceptive techniques as part of their campaigns because it’s effective, quick, and inexpensive According to the FBI, phishing was the most common type of cybercrime in 2020, with phishing incidents...
What is deception technology?

What is deception technology?

What is deception technology? Deception technology enables detection without compromising real data by using decoys or traps to trick cyber criminals into stealing fake data Nearly every week, it seems like the news reports another data breach or ransomware with data...
The blind spot in your cybersecurity monitoring strategy

The blind spot in your cybersecurity monitoring strategy

The blind-spot in your cybersecurity monitoring strategy Organisations are spending $120bn collectively on cybersecurity this year alone, a figure that is increasing 10% year on year There are new solutions coming to market all the time, and a constant stream of new...