![Detect Anomalous Activity Ahead of a Data Breach With Heuristics](https://www.kiteworks.com/wp-content/uploads/2024/05/Detect-Anomalous-Activity-Ahead-of-a-Data-Breach-With-Heuristics-560x360.jpg)
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Cliff White
![Cliff White, VP of Engineering, Cover Cliff White, VP of Engineering, Cover](/wp-content/uploads/2022/01/cliff-white-480x480-1.webp)
Cliff White, VP of Engineering, Cover
Cliff White is the VP of engineering at Cover and the former CTO at Kiteworks. He has more than 15 years of experience in the software industry and web-based technologies. He has managed global engineering teams and advised C-level executives on software product engineering and best practices. Before joining Kiteworks, Cliff developed highly scalable software for imageshack.com, an online media hosting company and one of the most visited websites on the internet. Previously, he led the engineering function for rentadvisor.com, a peer review and recommendation website for rental properties before it was acquired by apartmentlist.com. Cliff holds a bachelor’s degree in Computer Science from the University of California at Santa Cruz.
![Detect Anomalous Activity Ahead of a Data Breach With Heuristics](https://www.kiteworks.com/wp-content/uploads/2024/05/Detect-Anomalous-Activity-Ahead-of-a-Data-Breach-With-Heuristics-560x360.jpg)
![Control Third-party Communication Apps to Protect Your Third-party Workflows](https://www.kiteworks.com/wp-content/uploads/2022/10/Control-Third-party-Communication-Apps-to-Protect-Your-Third-party-Workflows-560x360.jpg)
Control Third-party Communication Apps to Protect Your Third-party Workflows
![](https://www.kiteworks.com/wp-content/uploads/2022/10/preserve-ip-and-pii-with-dynamic-governance-over-external-workflows-560x360.jpg)
Preserve IP and PII With Dynamic Governance Over External Workflows
![Remote Wipe: A Must for Mobile Security](https://www.kiteworks.com/wp-content/uploads/2014/10/Remote-Wipe-A-Must-for-Mobile-Security-1-560x360.jpg)
Remote Wipe: A Must for Mobile Security
![](https://www.kiteworks.com/wp-content/uploads/2022/10/healthcare-data-breaches-are-common-putting-patient-data-and-hipaa-compliance-at-risk-560x360.jpg)
Healthcare Data Breaches Are Common, Putting Patient Data and HIPAA Compliance at Risk
![](https://www.kiteworks.com/wp-content/uploads/2022/10/shine-a-light-on-third-party-threats-with-a-ciso-dashboard-560x360.jpg)
Shine a Light on Third-party Threats With a CISO Dashboard
![](https://www.kiteworks.com/wp-content/uploads/2022/09/protect-your-sensitive-content-with-these-ten-best-practices-560x360.jpg)
Protect Your Sensitive Content With These Ten Best Practices
![Lost and Stolen Mobile Devices Are the Leading Cause of Healthcare Data Breaches](https://www.kiteworks.com/wp-content/uploads/2022/09/Lost-and-Stolen-Mobile-Devices-Are-the-Leading-Cause-of-Healthcare-Data-Breaches-560x360.png)
Lost and Stolen Mobile Devices Are the Leading Cause of Healthcare Data Breaches
![](https://www.kiteworks.com/wp-content/uploads/2022/09/developers-beware-poor-coding-practices-poor-mobile-app-security-560x360.jpg)
Developers Beware: Poor Coding Practices Results in Poor Mobile App Security
![](https://www.kiteworks.com/wp-content/uploads/2022/09/partner-data-breaches-youre-only-as-strong-as-your-weakest-partner-560x360.jpg)
Partner Data Breaches: You’re Only as Strong as Your Weakest Partner
![](https://www.kiteworks.com/wp-content/uploads/2022/08/prevent-compliance-failures-with-complete-content-auditability-560x360.jpg)
Prevent Compliance Failures With Complete Content Auditability
![](https://www.kiteworks.com/wp-content/uploads/2022/08/lock-down-your-sensitive-data-with-powerful-data-encryption-560x360.jpg)
Lock Down Your Sensitive Data With Powerful Data Encryption
![Strengthen Data Security and Governance with Metadata](https://www.kiteworks.com/wp-content/uploads/2022/08/Strengthen-Data-Security-and-Governance-with-Metadata-560x360.jpg)
Strengthen Data Security and Governance with Metadata
![](https://www.kiteworks.com/wp-content/uploads/2022/01/lock-down-your-sensitive-enterprise-content-to-prevent-a-data-leak-560x360.jpg)
Lock Down Your Sensitive Enterprise Content to Prevent a Data Leak
![](https://www.kiteworks.com/wp-content/uploads/2020/03/protect-your-third-party-workflows-with-security-infrastructure-integrations-560x360.jpg)