Find Data Leaks Before They Become Gushers

Concerned about data leaks on third-party servers?  You are not alone.  When sensitive data is hosted on third-party servers, it becomes vulnerable because of human error, misconfigurations and other lack of security controls.  Left unaddressed, a data leak can turn into a data breach, bringing a gusher of damages. InfoSec teams are tasked with the […]

Read More… from Find Data Leaks Before They Become Gushers

From Risk to Threat: The Escalation of Data Leaks

Data Leaks

We hear about cyber attacks and data breaches frequently in the news.  Experts at Kiplinger caution:  “Resist the tendency to ignore a data-breach notification.”  However, in a recent study from the Ponemon Institute, the reality is that “even after a data breach, “32 percent of data breach victims took no action to protect their data.” […]

Read More… from From Risk to Threat: The Escalation of Data Leaks

How Secure are Your Third-parties’ Servers?

Outside the Enterprise Perimeter

At recent InfoSec World, digital risk and privacy were high priorities on the 2020 agenda. Security professionals gathered virtually to hear the keynote about how to prevent the next big data breach.  A common thread among sessions was how to diminish the digital risk of cybersecurity breaches. To make good business decisions, organizations must be aware […]

Read More… from How Secure are Your Third-parties’ Servers?

Innovative Machine Learning Model for Data Leak Detection

Machine Learning for Data Leak Detection

CybelAngel is able to alert on a set of sensitive blueprints amidst the thousands of billions of documents available on the web. Ever wondered how we are able to do it? Let us introduce you to the latest Machine Learning model for data leak detection: Content Scoring. We couple cutting-edge Machine Learning and human expertise. […]

Read More… from Innovative Machine Learning Model for Data Leak Detection

Wrong Time to Disregard Your Basic Cyber Hygiene

CybelAngel Adds Ex-FBI Executive Todd Carroll as Vice President of Cyber Operations

Toward the end of 2019, information security professionals were inundated with op-eds, whitepapers, and water cooler conversations concentrated on cybersecurity predictions for 2020. Understandably, few foresaw a global pandemic that would shift over 75% of work in North America to be performed remotely. Instead of chasing new wild geese, now should be the time to […]

Read More… from Wrong Time to Disregard Your Basic Cyber Hygiene

Avoiding Complacency in Detecting and Monitoring DNS Threats

Threat actors can employ a number of cyber social engineering tactics as part of their corporate phishing, counterfeiting, or hoaxing campaigns. One of the most popular assets utilized in these threat campaigns is a spoofed website, i.e., a website designed by a threat actor to appear to be the legitimate website of a targeted organization. […]

Read More… from Avoiding Complacency in Detecting and Monitoring DNS Threats