Skip to main content

Posts about Data Leaks

How to spot an open door to your network.
What is External Attack Surface Management (EASM) and How Can You Secure It?

Taking Cybersecurity Beyond the Obvious with EASM In 2005, a group of about 25 people posing as landscapers tunneled into the vault of the Banco Central bank in Fortaleza, Ceará, Brazil, making off with approximately US$71M. It was the largest bank robbery in Brazil’s history and, despite the lack of a cybersecurity breach, it’s also […]

An International Cybersecurity Collaboration Like No Other

CybelAngel CEO Erwan Keraudy advances EASM and preemptive cybersecurity with distinguished US and French cybersecurity delegation The French-American Foundation’s 2022 Cyber Security Conference, held November 29 to December 1, brought together nearly 100 leading cyber security experts and thought leaders from France and the U.S. to discuss the most pertinent cyber security challenges from both […]

The road to shadow IT is paved with good intentions
How to Manage the Risks and Costs of Shadow IT

Do your employees use personal drives to store or share corporate data? Do they forward corporate files to their personal email? Perhaps they’ve created repositories for document gathering and sharing for a joint project with a vendor…or installed a handy little app or extension they found online… If so, congratulations: You’ve probably got shadow IT. […]