Hindsight is Key to Success in 2020: Thoughts Heading to RSA

CybelAngel Adds Ex-FBI Executive Todd Carroll as Vice President of Cyber Operations

As the worldwide cyber security industry descends on San Francisco this weekend for RSA, I thought it wise to consider the major issues that attendees—from enterprise security professionals to vendors to journalists—ought to be thinking about throughout the week. With the benefit of hindsight of the events and experiences in 2019, I’m looking forward to […]

Read More… from Hindsight is Key to Success in 2020: Thoughts Heading to RSA

Evaluate the Security of Your Cloud Platform

CybelAngel Cyber Risk & Data Leak Dashboard

If you’re considering migrating your enterprise and development IT to a cloud platform, or have already migrated all or part of your business computing and DevOps to PaaS (platform-as-a-service), cyber security should be your top concern. Every application generates new potential security breaches via user delivery systems, event repositories, and the application’s database. Without a […]

Read More… from Evaluate the Security of Your Cloud Platform

How the Internet is Getting Safer Thanks to Cloud-based Services

Public Cloud Services Used Stats

No reader will be surprised to learn that cloud service adoption has been skyrocketing in the last few years. According to the Cisco Global Cloud Index: Forecast and Methodology, 2016-2021 whitepaper, “by 2021, 94 percent of workloads and compute instances will be processed by cloud data centers; 6 percent will be processed by traditional data […]

Read More… from How the Internet is Getting Safer Thanks to Cloud-based Services

UX Designers Join the Ranks of Cyber Security Heroes

CybelAngel Data Protection

At first glance, an enjoyable user experience (UX) and a strong cybersecurity posture don’t seem to go hand in hand. UX is all about designing a smooth workflow for users and facilitating their actions within an interface. Cybersecurity’s prime concern is the safety of connected systems. Who amongst us hasn’t struggled to log in to […]

Read More… from UX Designers Join the Ranks of Cyber Security Heroes

How Secure Are Your Projects on Trello?

Post-It Notes

The CybelAngel platform detects data leaks on a variety of sharing communities, including GitHub, paste sites, and importantly, Trello. Trello describes itself as an “easy, free, flexible, and visual way to manage your projects and organize anything.” CybelAngel has scanned thousands of “boards” on Trello, a board being the main webpage tied to a project. […]

Read More… from How Secure Are Your Projects on Trello?

Being the Best at Securing Your Network is Not Enough: The Case of Estonia

Being the Best at Securing Your Network is Not Enough: The Case of Estonia

When it comes to digitalization and cybersecurity, there is one country in this world that is several steps ahead of all others: Estonia. […]

Read More… from Being the Best at Securing Your Network is Not Enough: The Case of Estonia