Scattered Spider: How Certes DPRM Could Have Broken the Attack Chain
We explain how Certes DPRM would have neutralized the recent Scattered Spider retail ransomware attacks, and why a new approach to data security is needed...
August 26, 2025We explain how Certes DPRM would have neutralized the recent Scattered Spider retail ransomware attacks, and why a new approach to data security is needed...
August 26, 2025If your cloud provider can hand over your data without your knowledge, your cloud strategy is already a compliance failure. The idea that hosting data in a specific geographic region ensures sovereignty is a dangerous illusion. Data...
August 05, 2025For years, Active Directory (AD) has been the gold standard for identity and access management. It’s embedded in the DNA of enterprise IT, the engine behind logins, device authentication, and the digital workplace....
July 02, 2025Cybersecurity strategy has typically revolved around a single principle for too long: keep the bad guys out....
June 16, 2025Among the many aspects of digital resilience that DORA addresses, protecting data in transit plays a critical role in ensuring compliance with this regulation. In this blog post, we will explore why safeguarding data in transit is...
October 07, 2024