Galaxkey partners with Evolver to provide Data Privacy Protection in the USA

Galaxkey has today revealed a new partnership with Evolver LLC, a Converged Security Solutions company headquartered in Reston, Virginia. Under the new partnership, Galaxkey and Evolver will focus on providing world-class data security to commercial, legal sector and government clients in the USA.  The partnership will combine each company’s respective skills, resources and experience into […]

Read More… from Galaxkey partners with Evolver to provide Data Privacy Protection in the USA

What is file integrity monitoring?

The term file integrity monitoring, or FIM for short, refers to a specific IT security technology and process developed to test and check application, data base and operating system software files to assess if they have been tampered with or corrupted. FIM is a form of change auditing and validates and verifies files by comparing […]

Read More… from What is file integrity monitoring?

Five ways hackers can take over your email

Email accounts provide threat operators with a vast treasure trove of personally identifiable information (PII) that they can steal or exploit. They also provide a platform for them to launch a wide range of malicious activities, from spamming and spoofing to spear phishing and social engineering attacks. In this blog, we’ll count down different ways […]

Read More… from Five ways hackers can take over your email

How to protect enterprise email from threat operators

Email systems are an essential communication tool for companies that let them collaborate and engage with colleagues, partners, vendors and customers. In seconds, firms can send important information to those they work with or supply services to via email. However, email accounts can also act as valuable storehouses for important information, supplying a trackable record […]

Read More… from How to protect enterprise email from threat operators

Why are electronic documents more effective than wet ink signatures?

With more enterprises making the move towards digital transformation, many conventional methods of completing business processes have seen a substantial update. As a result, the use of electronic signatures to complete important documents has seen a significant increase in recent years. […]

Read More… from Why are electronic documents more effective than wet ink signatures?

Galaxkey takes its Education CSR program to Bradford schools

Galaxkey already supports the data protection needs of global organisations with our cutting-edge security solutions. But we also believe that as a responsible company, our role doesn’t end at building the best technology – we take this further and invest heavily in our Education CSR program. Through this program, we make the Galaxkey technology available […]

Read More… from Galaxkey takes its Education CSR program to Bradford schools

US school system data breach follows ransomware attack

The insidious ransomware gang known as Vice Society recently published documents and data that it stole from the Los Angeles Unified School District (LAUSD) in a dedicated cyberattack. Superintendent for the LAUSD, Alberto M. Carvalho, provided a statement via social media platform Twitter, confirming the disclosure of stolen data while simultaneously announcing a built-for-purpose hotline […]

Read More… from US school system data breach follows ransomware attack