<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

Datashield

Datashield

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Recent Posts:

How Blended Attacks Work

A blended attack is one of the most powerful weapons in the arsenal of a bad actor intending harm to digital assets and computing systems. A blended attack is a sophisticated cyber attack that utilizes a mix of malicious code, computer viruses, worms or Trojan horses and exploits multiple software or hardware vulnerabilities known to the attacker.

On-Premise vs Cloud SIEM

The idea of collecting data from logs and using this data for analyzing the behavior of software applications, endpoints and servers dates back to the 80s. It took over a decade for the first Security Information and Event Management (SIEM) systems to appear as an on-premise security tool that collects logs from multiple collection points to detect abnormal activity.

What is Email Encryption?

Encryption is a method to cypher data that a user sends and receives, as well as data that resides on endpoints and servers.

Datashield Kicks Off MicroAge Summer Sales Contest

Scottsdale, Ariz.-- Datashield is proud to announce our MicroAge Summer Cash Contest. In partnership with technology sales and service company MicroAge, the contest is set to reward our partner's sales force for learning and growing Datashield's brand and client base.

Malwarebytes Overview

The ever-changing threat landscape that enterprise infrastructure endpoints face requires a comprehensive solution to discover, categorize, and respond to both old and new threats. Malwarebytes delivers dynamic endpoint security to combat this. It provides the following features to discovering and responding to cyber threats:

How Proofpoint Enables Business Continuity

Email is the lifeline that connects remote workers to their organizations, especially a growing number of teams work from home or collaborate across the globe. But increasing an organization’s digital presence brings with it a growing number of digital threats. Crashes in cloud-based email platforms can slash productivity and create complications. Meanwhile, sophisticated cyber-attacks can compromise not just the security of employees, but also their data and the applications they use to do their jobs.

Why UEBA Software is Necessary for the Remote Workforce

When an organization has a highly remote workforce or shifts its operations to remote working, even temporarily, they could be opening their network to many risks. One way to mitigate them is by implementing UEBA software. UEBA stands for User and Event Behavior Analytics or User and Entity Behavior Analytics, depending on who you ask.

Why Multi-Factor Authentication is Critical Right Now

Emergencies such as natural disasters or pandemics force organizations to take measures for establishing work-from-home procedures. One of the first security measures organizations must implement for remote work is multi-factor authentication (MFA). Multi-factor authentication is a method to protect access to corporate networks and business-critical systems, both on-premises and remotely. It requires an employee or a partner to provide at least two authentication factors to confirm his or her identity and login credentials.

Sarbanes-Oxley Act Overview

The Sarbanes-Oxley Act (SOX) was enacted in 2002 following a series of corporate scandals involving large public companies in the United States. The main goal of the legislation was to restore the trust in the U.S. financial markets and prevent public companies from defrauding their investors.

What is SCADA and IoT?

Learn about the difference between SCADA and IoT systems and how they work and compare to one another.

    Related Posts