ArmorText
Blogs & Articles
What Does ‘Purpose-Built for Out-of-Band Communications’ Mean?
Interestingly, ArmorText was the only solution in the report that Forrester noted offers “out-of-band communications.” We have seen a shift in how “out-of-band communication” is defined since the Q2 2022 Forrester Wave™: Secure Communications Solutions. The industry went through a period where many vendors self-identified “out-of-band communications for IR, SecOps” as one of their top three extended use cases but now ArmorText is the only vendor in the current Wave that was purpose-built for out-of-band communications.
6 Key Takeaways from the SABA 2024 CLE Session on Cybersecurity for In-house Counsel
ArmorText CEO Navroop Mitter shared insights alongside legal experts at SABA panel “We’re Under (Cyber)Attack! Interdisciplinary Best Practices for In-house Counsel.”
New: ‘Cyber Resilience: Incident Response Tabletop Exercises Q2 2024’
New and extremely sophisticated cyberattacks are taking organizations by surprise. Get the latest in our series of tabletops co-published with Crowell & Moring.
Digging Into Self-Identified Out-of-Band Communications in Industry Analyst’s Q2 2024 Report
Regardless of how vendors self-identify, it’s important for organizations to consider what makes an out-of-band option truly appropriate for IR and SecOps comms
Announcing: ‘Cyber Resilience: Incident Response Tabletop Exercises 2023’
We collaborated with law firm Crowell & Moring to release ‘Cyber Resilience: Incident Response Tabletop Exercises 2023’ because like us they recognize that there is no better tool than preparedness. We believe making this guide publicly available to a wider audience is vastly more valuable than any short term monetary gain.
Guarding The Guardians: How Secure Comms Outwit Cyber Spies
Embracing the military ethos of staying ‘Left of Bang’ – a proactive rather than reactive approach to threats – is pivotal for Security Operations, DevSecOps, and Threat Intel Sharing communications. These areas are lucrative targets for threat actors intending to sustain or propagate attacks. This strategy entails implementing safeguarding measures not just in the aftermath of a breach, but before potential threats are realized.
Cybersecurity is a Shared Responsibility
In today’s interconnected world, the cybersecurity landscape is evolving at an unprecedented pace. Two major perspectives have emerged in the discourse, with one focusing on organizational accountability for cybersecurity and the other shifting the responsibility from customers to manufacturers. These viewpoints are not mutually exclusive, but rather, they form a composite picture of the cybersecurity reality we face today.
Why Wired’s Consumer Messaging Advice Doesn’t Cut It for Enterprises
Recent advice on maintaining individual privacy from Wired simply doesn’t cut it for enterprises with legal, compliance, and regulatory concerns. Here’s how organizations can improve upon Wired’s recommendations.
Executive Awareness of Collaboration (In)Security is on the Rise
94% of respondents in Mimecast’s The State of Email Security 2023 report agreed that Google Workspace and Microsoft O365 native security functionality just is not cutting it.
A New Era for E-Discovery: RSMF Support Added to ArmorText for Reviewers
With official support for the export of selected ranges of retained records by Reviewers within their Scopes-of-Review into the RSMF format, ArmorText is taking a significant step forward in the realm of e-Discovery. RSMF format allows for the seamless import and analysis of various types of digital communications for e-Discovery. This includes emails, chats, instant messages, SMS, MMS, and now ArmorText.