Security

The Dark Side of ChatGPT: How AI is Changing the Landscape of Cyber Security

Despite the benefits that AI and machine learning have brought to the field of cyber security, ChatGPT represents a new level of potential risk. While other AI tools have focused on detecting and preventing suspicious activity, ChatGPT has the ability to actively assist malicious actors in their efforts to...

How to Choose a Data Center–Including a Thorough Checklist

Researching data centers is no easy task; there are a load of aspects to consider. Whatever caused the search to begin, look no further. We’ve compiled a list of the most important features to look for and the questions to ask to make sure you’re getting the most out...

3 Consequences of Cloud Misconfiguration

Cloud misconfigurations—gaps or errors that create system vulnerabilities—are extremely common, especially with popular cloud platforms like AWS leaving the responsibility to buyers. Here's why it's vital to get it right....

2021 Data Breach Statistics to Know

In 2021, the cost of a data breach increased by the largest margin in seven years. It’s reached an unbelievable average of $4.24 million dollars, or an average 38% of total revenue loss per organization. ...

Q2 2021 Headliners

Here are the biggest things from this past quarter that we don’t want you to miss. New User Levels for WFA Security Challenges: Post-pandemic, many organizations are managing semi- or all-virtual operations, with a lot of uncertainty regarding how to keep distributed data safe....

3 Overlooked Security Concerns with a Hybrid Workforce

When it comes to the security of a distributed workforce, we’re not only talking about employees working from home, we’re talking about employees working from anywhere. The distinction opens up new concerns over network security, maintaining compliance, and avoiding data exposure....

Q1 2021 Headliners

Here are the biggest things from this past quarter that we don’t want you to miss. In our Suite of Technology, check out the latest from H5MA: version 2.7.3 has introduced a Privilege Log Builder Module. The builder improves and optimizes the workflow by including a customizable and reusable...

A Buyer’s Guide to Security and Privacy Certifications

IT procurement teams now have difficulty asking the right questions to shine a light on policies that govern their sensitive data and, perhaps more importantly, verify the accuracy and ongoing adherence to those policies....

Cloud Security Certification ISO/IEC 27018:2019 Achieved

We're ISO/IEC 27018 certified! This cloud-security-specific standard aligns with and complements our other accredited security certifications. To top it off, we're now the only Relativity partner publicly recognized as having ISO 27001, 27017, and 27018. ...