Social Engineering

What is Social Engineering? Social Engineering is a cyberattack method that tricks people into revealing sensitive information or performing actions that compromise security. Instead of hacking systems directly, attackers manipulate human psychology to gain access to accounts, data, or networks. Common Social Engineering Tactics Phishing: Sending fake emails or messages that appear legitimate to steal […]

Sender Policy Framework (SPF)

What is Sender Policy Framework (SPF)? Sender Policy Framework (SPF) is an email authentication system designed to prevent email spoofing, a technique commonly used in phishing attacks where a malicious actor impersonates a legitimate sender. SPF works by allowing domain owners to define which mail servers are authorized to send emails on behalf of their domain. […]

Spoofing

What is Spoofing? Spoofing is a cybersecurity threat where attackers disguise themselves as a trusted entity to deceive individuals or systems. This deceptive practice can take many forms, including email spoofing (forging sender addresses), website spoofing (creating fraudulent sites to steal credentials), caller ID spoofing (falsifying phone numbers), and IP spoofing (manipulating network addresses). The […]

Sarbanes-Oxley Act (SOX)

What is Sarbanes-Oxley Act (SOX)? The Sarbanes-Oxley Act of 2002, or SOX,is a U.S. federal law enacted to enhance corporate transparency and prevent fraudulent financial practices. It was introduced in response to major corporate scandals to protect shareholders and the public by improving the accuracy and reliability of corporate disclosures.   SOX mandates strict requirements […]

Security Awareness Training

What is Security Awareness Training? Security Awareness Training is the program for educating employees on cybersecurity risks, threats, and best practices to protect an organization’s data, systems, and assets. This training equips employees with the knowledge and skills to identify and prevent threats such as phishing, malware, social engineering, and insider threats. By fostering a […]

Spear Phishing

Spear Phishing Spear phishing is a targeted phishing attack in which cybercriminals tailor fraudulent emails or messages to specific individuals or organizations. Unlike generic phishing attempts, spear-phishing relies on detailed information about the target, such as its name, job title, organization, or recent activities, raising the credibility of the attack. These information are often obtained […]

SaaS Security Posture Management (SSPM)

SaaS Security Posture Management (SSPM) SSPM, or SaaS Security Posture Management, refers to a systematic approach to ensuring the security of cloud-based software applications. It involves continuously monitoring and assessing the configurations, access controls, and security policies of SaaS platforms to identify vulnerabilities or misconfigurations that could lead to potential risks. By automating compliance checks […]

Shadow IT

Shadow IT Shadow IT refers to the practice of employees or departments using technology solutions—such as software applications, cloud services, or hardware devices—without the approval, oversight, or awareness of the organization’s IT department. This often arises when users seek faster or more convenient tools to meet their needs, bypassing formal procurement or security processes. While it […]

Shadow Data

Shadow Data Shadow data refers to data that an organization possesses but is not actively tracked, managed, or officially recognized by its data governance processes. This can include duplicate files, old backups, or data stored in unauthorized locations like personal devices or cloud services. Because it’s not centrally controlled, shadow data can pose significant security risks, […]

Shadow SaaS

Shadow SaaS Shadow SaaS refers to the use of software-as-a-service (SaaS) applications within an organization without the knowledge, approval, or oversight of the IT department. These unauthorized applications are typically adopted by employees or departments to meet specific needs that are not being adequately addressed by the company’s approved tools. While these applications can enhance […]

Secure Multi-Party Computation (SMPC)

Secure Multi-Party Computation (SMPC) Secure multi-party computation (SMPC) is a cryptographic method that allows multiple parties to jointly compute a function over their inputs while keeping those inputs private from each other. In SMPC, each participant’s data remains confidential, and only the final output of the computation is shared among the parties. The process is […]

Static Data Masking (SDM)

Static Data Masking (SDM) Static data masking is a process that permanently alters sensitive data in a database or data set, replacing it with fictional but realistic data. Unlike dynamic data masking (DDM), which modifies data in real-time during access, SDM actually changes the stored data itself. This masked data is typically used in non-production […]

iSMG Data Security Summit: Dallas

May 15, 2025
Renaissance Dallas at Plano Legacy West Hotel

Join us at our session to learn more about data security, privacy, and governance in the age of LLMs.

Keep me informed