Over the past few years, we have seen that traditional data protection methods needed to evolve in order for organizations to better protect themselves from potential threats, both internal and…
We all know that authorization and authentication play critical roles in secure enterprise environments. Best practices require that companies ensure that corporate, department and group administrators are only assigned the…
Ransomware fears hit new heights this week with a recent round of attacks on the healthcare industry. This new threat prompted the Department of Homeland Security’s…
Aarash Heydari is a Member of Technical Staff for Clumio’s Backend team. He completed his undergraduate studies in computer science at UC Berkeley. Aarash spends his free time in quarantine…