Cloud and Data Security Microsoft 365 Products & News FeaturesSpanning Release Notes: Microsoft 365 Backup with Integrated Dark Web MonitoringKeep your Microsoft 365 credentials and data secured with the new Spanning Microsoft 365 Backup feature — Dark Web monitoring.Read in 2 minutes
Cloud and Data SecurityIntrusion Detection Systems: A Deep Dive Into NIDS & HIDSIntrusion Detection Systems (IDS) are instrumental in guarding data from unauthorized access. Learn the main types of IDS and the role they play in data security.Read in 4 minutes
Cloud and Data SecurityInsecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and …Read in 4 minutes
Cloud and Data SecurityOAuth 2.0: What Is It and How Does It Work?Learn what OAuth 2.0 protocol is, how open authorization works, and more importantly, why OAuth is vital for your backup vendors.Read in 3 minutes
Backup Cloud and Data Security4 Data Lifecycle Management Mistakes Businesses Should Avoid Learn the basics of data lifecycle management and how to avoid data lifecycle management mistakes that can be costly to your data and business.Read in 4 minutes
Cloud and Data Security Microsoft 365Dridex — Malware of the Month, December 2019Dridex — a malware specifically designed to attack financial services organizations and banks — is Spanning’s Malware of the Month for December 2019. Learn how it has evolved and resulted in the …Read in 3 minutes
Cloud and Data SecuritySaaS Data Encryption: Data at Rest vs Data In-TransitSaaS data encryption involves having state of the art encryption at rest and encryption in-transit. The right SaaS backup can provide security to data whether data is at rest or data is in-transit.Read in 3 minutes
Cloud and Data Security Compliance Microsoft 365Why Granular SharePoint Backup and Recovery is ImportantSelective, granular SharePoint backup and recovery can help organizations to meet security standards, comply with industry regulations, and reduce liabilities. Learn why a blanket backup solution is …Read in 3 minutes
Cloud and Data SecurityDeepfake: The AI Endangering Your Cybersecurity How dangerous is deepfake to cybersecurity? The AI-based forgery is creating fear among businesses due to its growing popularity among cybercriminals.Read in 3 minutes