Kelsey McGuire

  • 6 Independent Third-Party Sources for Vetting Cloud Security Vendors

    6 Independent Third-Party Sources for Vetting Cloud Security Vendors

    A top challenge that CISOs face when managing cybersecurity risks is consolidating an overabundance of vendor point solutions. Vetting cloud security vendors is a must for every IT and security team.

    Read
  • Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More

    Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the Capital One data breach, British...

    Read
  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • The California Consumer Privacy Act is Coming – Does Your Organization Meet CCPA Compliance?

    The California Consumer Privacy Act is Coming – Does Your Organization Meet CCPA Compliance?

    California’s Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. While that may seem far away, organizations only have a matter of months to align with the legislation to avoid...

    Read
  • Uncovering the Value of Salesforce Event Monitoring Logs

    Uncovering the Value of Salesforce Event Monitoring Logs

    Have you ever wanted to know what your Salesforce users are clicking on? Have you ever needed to know what files your employees are downloading? Normally, uncovering this information is...

    Read
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • Monthly Cloud Security Roundup: NASA Security Hack, Chaos in Silicon Valley, and More

    Monthly Cloud Security Roundup: NASA Security Hack, Chaos in Silicon Valley, and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss a NASA security hack, Maine’s internet...

    Read
  • New Cybercrime-Fighting Unit to Enforce New York Cybersecurity Regulations for Financial Institutions

    New Cybercrime-Fighting Unit to Enforce New York Cybersecurity Regulations for Financial Institutions

    The Wall Street Journal recently reported that a newly-founded crime-fighting cyber unit will begin enforcing security rules laid forth by New York cybersecurity regulations. The primary role of...

    Read
  • Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release

    Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release

    Eagerly anticipated by Salesforce users every season, the newest product release for 2019 brings exciting updates for Salesforce’s Event Monitoring tool. Primarily used to gain visibility in...

    Read
  • Insider Threat Awareness: Do You Recognize These 5 Familiar Faces?

    Insider Threat Awareness: Do You Recognize These 5 Familiar Faces?

    Would you recognize these 5 familiar faces of the insider threat? You might be surprised. Test your insider threat awareness with this post!

    Read
  • Monthly Cloud Security Roundup: The Debut of Salesforce Blockchain, Equifax’s $1.4B Breach Costs, and More

    Monthly Cloud Security Roundup: The Debut of Salesforce Blockchain, Equifax’s $1.4B Breach Costs, and More

    Each month, we’ll bring you a few of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the debut of Salesforce Blockchain, zero...

    Read
  • You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...

    Read
  • The Impact of GDPR One Year Later: The Good, The Bad, and The Future

    The Impact of GDPR One Year Later: The Good, The Bad, and The Future

    May 25, 2019 is the first anniversary of the implementation of the EU’s General Data Protection Regulation (GDPR). The impact of GDPR was felt across the world – since its introduction, privacy...

    Read
  • 5 Questions Banks Should Ask When Evaluating Cloud-Based Security Solutions

    5 Questions Banks Should Ask When Evaluating Cloud-Based Security Solutions

    When banks move to the cloud, the top challenges are a) security and b) regulatory compliance. Evaluating cloud-based security solutions for financial institutions is something that calls for...

    Read
  • Monthly Cloud Security Roundup: Facebook’s FTC Charges, iOS Malvertising Attacks, and More

    Monthly Cloud Security Roundup: Facebook’s FTC Charges, iOS Malvertising Attacks, and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s FTC charges, iOS malvertising...

    Read
  • 9 Steps to Creating a Drug Diversion Monitoring Program

    9 Steps to Creating a Drug Diversion Monitoring Program

    A nurse gets into a car accident and requires surgery. After surgery, the nurse is prescribed painkillers and becomes addicted. Because she works in a hospital, the nurse has access to drugs and...

    Read
  • U.S. House and Senate Debate New American Data Privacy Laws

    U.S. House and Senate Debate New American Data Privacy Laws

    In a country where 91% of citizens feel they’ve lost control of their data, U.S. lawmakers recently held hearings to discuss new national data privacy laws. The U.S. House and Senate hearings...

    Read
  • What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    In June 2017, the world’s #1 CRM platform, Salesforce, released their newly rebranded analytics tools for viewing data – Einstein Analytics (formerly known as “Wave”). Many who use the platform...

    Read
  • 5 Types of Insider Threats in Financial Organizations – and How to Mitigate Them

    5 Types of Insider Threats in Financial Organizations – and How to Mitigate Them

    Cybersecurity threats are a continuous concern for financial organizations – in fact, financial service firms face 300 times more security incidents than other industries.

    Read
  • 7 Insights from Cisco’s 2019 CISO Benchmark Study

    7 Insights from Cisco’s 2019 CISO Benchmark Study

    To help CISOs better anticipate the challenges they face in their role, Cisco released a new chapter in its Cybersecurity Series – the 2019 CISO Benchmark Study.

    Read
  • loading
    Loading More...