Understanding the Cybersecurity Threat Social Media Poses to Your Enterprise
Enterprise cybersecurity programs are tasked with protecting the company’s data and limiting the impact of data breaches. But, when you think about cybersecurity, do you think about the effect social…
Regulatory Compliance Part 2: Industry Regulations and Implementation
In my previous blog, I looked broadly at the regulatory compliance landscape facing companies today. To build on that foundation, in this article I’ll break down some of the specific…
Regulatory Compliance Part 1: Understanding Your Obligations
The term “heavily regulated industry” is commonly used when referring to many industries today. In the U.S., it can apply to healthcare, finance and insurance, energy, technology, life sciences, and…
Understanding Cybersecurity Threat Hunting – How it Works and its Importance
The constant evolution of technology presents organizations with more sophisticated tools to increase the efficiency of their processes. Unfortunately, technological improvement has also given cyber attackers more advanced tactics, techniques,…
Common Cyber-attacks in the U.S.
Cyber-attacks have risen worldwide, especially since the COVID-19 pandemic struck, with an increased number of companies suffering data breaches. According to Business Wire, 81% of organizations globally have experienced an…
Cybersecurity Defense-in-depth and Graph Analytics
Cybersecurity requires proactive defenses that will find and deal with advanced security threats. These systems can stop the cyber-attacks that your organization will almost certainly encounter. This protection provides multiple…
The EU General Data Protection Regulation – What Is It and How Can Graph Help?
It was a long time coming, but the EU data security and privacy law, known as the General Data Protection Regulation (GDPR), was finalized in 2018 and is in full…