Jason Costain

Jason Costain

Data Protection Specialist

Jason Costain is a security expert specializing in personal data protection. He offers rich insights into incident response planning, cloud security best practices, and the importance of multifactor authentication. With his highly applicable and easy-to-understand publications, Jason empowers his readers with the best methods to protect their sensitive data.

Security Mastering Enterprise Security Validation for Complex Networks

In today's hyper-connected business environment, enterprises face exponential growth in cyber threats targeting their complex networks. As organizations expand their digital reach, they encounter unprecedented challenges in safeguarding intricate IT ecosystems. The reality for many is a vast

Mastering Enterprise Security Validation for Complex Networks
Security NCSC Offers Guide for Safe Disposal of IT Assets

Organizations seeking guidance on securely decommissioning IT assets recently received support from the National Cyber Security Centre (NCSC). The agency published a guide stressing the importance of retiring data, software, and hardware safely, warning of severe consequences if mishandled. IT

NCSC Offers Guide for Safe Disposal of IT Assets
Security Digital Locking Solutions – A Review

In an era where safeguarding critical infrastructure has become paramount, traditional mechanical locks are gradually being replaced by advanced digital systems. Such a transition offers enhanced security, flexibility, and efficiency, and ASSA ABLOY's eCLIQ digital locking solution shines as a

Digital Locking Solutions – A Review
Security How Does TriMet Boost MAX Elevators' Safety and Access?

In the rapidly evolving landscape of public transportation, ensuring the safety and accessibility of all facilities remains paramount. TriMet, a major player in the Portland, Oregon area’s transit system, has taken significant strides to improve the functionality and security of MAX station e

How Does TriMet Boost MAX Elevators' Safety and Access?
Security Verizon DBIR: Rise in Vulnerability Exploits and Third-Party Breaches

In today's rapidly evolving digital landscape, businesses are consistently challenged by an increase in cybersecurity threats. At the heart of these challenges is the noticeable and alarming rise in the exploitation of vulnerabilities and breaches attributed to third-party associations, as

Verizon DBIR: Rise in Vulnerability Exploits and Third-Party Breaches
Security Data Strategy Revolutionizes Zero Trust in Federal Agencies

In the dynamic world of cybersecurity, Malik Haidar stands out as a leader in integrating business-savvy strategies into technical frameworks. With a strong background in tackling threats for multinational corporations, Malik's insights offer a unique perspective on developing a robust

Data Strategy Revolutionizes Zero Trust in Federal Agencies
Security How Did Babuk Ransomware Bypass SentinelOne's Defenses?

In the rapidly evolving landscape of cybersecurity, even the most sophisticated defense mechanisms can be challenged by crafty cybercriminals. Such was the case in a recent incident where a threat actor successfully bypassed SentinelOne's Endpoint Detection and Response (EDR) system to deploy

How Did Babuk Ransomware Bypass SentinelOne's Defenses?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address