Texas SB 820: Stronger Cybersecurity Requirements for Texas Schools
Virtru
by Megan Leader
4h ago
In public education, cybersecurity policy can feel like the Wild West. At the federal level, you have FERPA, HIPAA, and COPPA, which are pretty straightforward regulations. But at the state and local levels, things get increasingly fragmented: Every state has its own data privacy regulations (or lack thereof). Every district has its own budget and priorities. Every school has its own staffing resources and resident technology expertise ..read more
Visit website
The Power of Information Sharing: AUKUS Pillar 2 and Mitigating Great Power Competition Risks
Virtru
by Shannon Vaughn
4h ago
In an era of intensifying Great Power Competition, the importance of information sharing at-scale cannot be overstated. As geopolitical tensions rise, the AUKUS partnership between Australia, the United Kingdom, and the United States has emerged as a beacon of collaborative defense strategy. Additionally, the formation of AUKUS is a significant development in response to increasing friction between nation states, specifically addressing China's growing influence and push for authoritarian values. Serving as a strategic counterweight to China, AUKUS has developed a multi-pronged agreement and ..read more
Visit website
Using Gemini for Google Workspace? You Need Secure Data Sharing.
Virtru
by Editorial Team
4d ago
AI continues to revolutionize the way we work. The introduction of Gemini for Google Workspace gives users the ability to generate content and collaborate faster than ever before, with tools that distill insights and action items from vast amounts of workplace data.  ..read more
Visit website
Virtru Secure Share for Google Drive: Collaborate Without Sacrificing Security
Virtru
by Editorial Team
4d ago
There are some productivity apps that give IT leaders heartburn. Teams need to use these apps to get their jobs done, but IT leaders can’t ignore the risks, especially when it comes to external collaboration.  ..read more
Visit website
NATO and Virtru: Two Important Security Meetings Happening in Washington DC This Week
Virtru
by Matt Howard
2w ago
This week, Washington DC is hosting two significant security-focused meetings, each addressing critical aspects of protection in our modern world. While they may seem unrelated at first glance, both the NATO summit and Virtru's mid-year enablement meeting share a common goal: safeguarding what matters most ..read more
Visit website
31 Ways to Use Virtru Secure Share - Virtru
Virtru
by Editorial Team
2w ago
For modern organizations, SFTP and legacy file transfer tools just don't cut it anymore: Their outdated user interfaces and poor recipient experiences mean that teams simply won't use them.  For teams to use encrypted file transfer tools, those tools must be simple, and they must complement users' existing workflows. Enter Virtru Secure Share: an encrypted file-sharing solution that equips organizations to send and receive sensitive data securely, in a wide variety of workflows. From a standalone, platform-agnostic browser experience to seamless integrations with Confluence and Zendesk ..read more
Visit website
Respecting Data and Enhancing Privacy in the Era of Cloud Collaboration
Virtru
by Matt Howard
3w ago
Conventional wisdom has long held that privacy is dead in the digital age. Users, it was believed, were willing to trade their personal information for simple cloud-based collaboration experiences. However, recent developments in the tech industry, particularly with Apple and Google Workspace, are challenging this notion. Privacy is not only alive but is quickly becoming a key capability upon which these tech giants are competing ..read more
Visit website
The June 2024 MOVEit Vulnerability: Why Virtru Secure Share Offers a Compelling Alternative
Virtru
by Matt Howard
3w ago
Earlier this week Progress Software disclosed another critical vulnerability in the MOVEit file transfer system that sent shockwaves through IT security teams around the  world. This vulnerability, known as CVE-2024-5806, exposes countless organizations to potential data breaches and unauthorized access. As businesses scramble to patch their systems, it's crucial to consider alternative solutions that can mitigate such risks in the future ..read more
Visit website
A State’s Battle Against ‘Stone Age’ IT: Taking Back Control with Virtru
Virtru
by Christian Eng
1M ago
Over 6,000 years ago, the first written message was delivered by hand on a clay tablet in ancient Mesopotamia. Back then, civilizations were plagued with duplicate data, slow transmission, and little security ..read more
Visit website
Virtru vs. Zix: Choosing the Right Email Encryption Solution for Your Business
Virtru
by Editorial Team
1M ago
Email remains the lifeblood of business communication, but it's also a common threat vector: It’s the easiest and most accessible way for sensitive information to leave your organization. . While email platforms like Gmail and Microsoft 365 offer some built-in security, those native protections only go so far. That's where email encryption solutions come in. Two popular options are Virtru and Zix - but which one is the best fit for your organization's needs ..read more
Visit website

Follow Virtru on FeedSpot

Continue with Google
Continue with Apple
OR