2019 leader data protection

2019 The Year of Data Regulations

Data regulation is now a strong, permanent feature of the IT landscape. Over the past year, a series of sweeping regulations have come into force that have brought change on entire industries. Global business will have to operate in a new data environment in 2019.  With the year coming to [...]

Read More

Addressing Insider Threats with Cybersecurity

IT Technology Our ever expanding IT technology is creating major changes in the way enterprises handle their data. While the expansion and diversification of computation tools has brought tremendous growth to the IT industry–as well as the business that utilize them–the new trends have come with a price. As organizations [...]

Read More

Data Centric Auditing and Protection

Today is the era of big data.   The volume of information that requires storage, processing, and assessment is growing at an exponential rate.   What this means for enterprises, is that new methods for managing digital data are becoming a necessity.   Nowhere is this need felt more than when [...]

Read More

Cloud Data Protection

The shift to the cloud.   It’s one of the IT world’s fastest growing trends. Cloud storage has brought about a revolution in data management, allowing enterprises to store and process large quantities of data without dealing with the costs and maintenance of on-site hardware. More importantly, the cloud has [...]

Read More

Zero Trust Data Protection

Zero Trust Data Protection   Out with the Old Conventional security models, those based on firewalls, IDS, and the like, operate on the outdated assumption that “everything on the inside of an organization’s network can be trusted”.   The contemporary threat landscape facing IT has shown that this is simply [...]

Read More

Blockchain the Pros and Cons

In an era where cyberattacks can paralyze entire networks, the need for effective, reliable IT security has become paramount.   Some think they have found the silver bullet in the war against hackers. The Blockchain Revolution   When Bitcoin creator Satoshi Nakamoto, whose true identity is still unknown, revealed his [...]

Read More

Insider Threat and 3rd Party Liability

PageUp and the 3rd Party Liability Problem 3rd Party Liabilities   The tech world was thrown into frenzy over the recent hack of international HR service provider PageUp. In late June, chief executives reported “unusual activity” in its IT infrastructure.  An investigation was launched and emergency notifications were distributed to [...]

Read More

Fileless Malware Taking on the Threat

Taking on the Threat of Fileless Malware Over the past two years, the IT industry has faced an important shift in the way cyber criminals go about their attacks.   Some of the biggest names in the field of cyber security have been tracking the growing threat of fileless malware [...]

Read More

Equifax submits statement to congressional committees regarding cybersecurity incidient

Equifax Submits Additional Statements to Congress Regarding the Incident Equifax submitted a statement to congressional committees to supplement the company’s responses regarding the extent of the incident impacting U.S. consumers.  “As announced on September 7, 2017, the information stolen by the attackers primarily included: “As a result of its analysis of the [...]

Read More

DLP is Still Going Strong

  DLP, THE ANALYSTS AND VENDORS A blog: For nearly two decades, deploying Data Loss Prevention (DLP) has been a staple for enterprises seeking to secure their data assets. Despite being such an important part of an information security strategy, some observers have recently begun to cast doubt on the [...]

Read More

Intelligent Technologies for EU GDPR

Intelligent Technologies for EU GDPR With the long anticipated General Data Protection Regulations (GDPR) of the European Union coming into effect in May, companies across the globe are scrambling to insure their data management systems are ready for the new responsibility. GDPR presents a tall order for firms that want [...]

Read More