<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Incident Response Planning (IRP): 3 questions you should ask

If IRPs are mandatory to prepare for post-breach circumstances, organizations need to ask themselves these three questions. Data breach madness has reached a peak, as organizations slowly but surely discover one by one how no one is safe in today's cyberclimate. And experts universally agree that intrusions are inevitable, since attack vectors keep appearing in the form...

Today's approach to shadow IT: Make it a non issue

Thanks to modern technologies, shadow IT in full swing and IT departments are struggling to shine light on unauthorized cloud app usage. From malware to phishing, enterprise IT often turns to interesting terminology to identify and label cybersecurity threats. Shadow IT is no exception to this rule, as the phrase describes the unauthorized use of software, hardware...