Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2024

NIST SP 800-162 Attribute Based Access Control (ABAC) Guide

NIST SP 800-162 ‘Guide to Attribute Based Access Control (ABAC) Definition and Considerations’ is a special publication that defines attribute-based access control (ABAC) for U.S. government agencies. It also provides guidance on using ABAC to improve and maintain control of information sharing within and between organizations and best practices for ABAC implementations.

Navigating the Digital Landscape: Essential Security Measures for Small Businesses

In an era where digital threats are escalating, small businesses must prioritize cybersecurity. This article delves into essential security practices, focusing on secure passwords, software updates, and the strategic use of paystub generators, supplemented by real-world examples of breaches and their implications.

How to Ensure Enterprise Data Security against Privilege Abuse: Top 8 Best Practices

A system administrator plays a prominent role in maintaining your IT operations, ensuring system performance, and keeping your organization compliant with enterprise data security requirements. System administrators have complete control over the ins and outs of your databases and, in many cases, its underlying physical infrastructure. That’s why you need to pay close attention to admins’ actions to prevent privilege abuse and preserve enterprise data privacy and integrity.

How Egnyte Metadata Supports DLP Integration

Using AI-based content detection, Egnyte has demonstrated the ability to detect and classify millions of documents for our customers over several years. Egnyte customers can locate files containing sensitive information, write safeguard policies to control how they are shared, and write file lifecycle management policies to automate retention, archival, and deletion.
Featured Post

The tension between the CDO and the CISO: The balancing act of data exploitation versus protection

Data is the most valuable resource for the global enterprise. For any company wanting to remain relevant in today's competitive business landscape, data needs to be at the centre of every business decision, allowing the C-suite to review initiatives, make real-time decisions and if necessary reverse actions. A quick response fuelled by real data insights will power and improve the customer experience and product offerings while driving lower prices through better efficiency. Ultimately, this will improve the bottom line and deliver successful outcomes for many organisations.

Ensuring Microsoft 365 Data Security and Compliance with Veeam

As of 2023, Microsoft Office 365 is utilized by over a million companies globally, according to a recent Statista report. It has become an indispensable tool for organizations as they adapt to hybrid workforces and a global economy, leveraging its collaborative power and the need for a robust data protection strategy. At the core of Microsoft 365’s security framework lies the Shared Responsibility Model, delineating the responsibilities of Microsoft and organizations using their services.

4 Tips For Staying Ahead of Cybersecurity Threats in 2024

As we kick off the new year, we're excited to look back on all that we learned in 2023. This past year saw some momentous advancements, including the large-scale adoption of generative AI (GenAI). However, it also saw some devastating data breaches. According to IBM’s latest “Cost of a Data Breach” report, 95% of studied companies experienced a breach in 2023.

Australia's Six Cyber Shields and One Strategy to Rule Them All

The newly unveiled 2023-2030 Australian Cyber Security Strategy (the Strategy) lays out six cyber shields to achieve the Australian Government’s goal of becoming a world leader in cyber security by 2030. It aims to substantially improve the country’s overall cyber security posture, the ability to manage cyber risks and respond to cyberattacks quickly.

AI and security: It is complicated but doesn't need to be

AI is growing in popularity and this trend is only set to continue. This is supported by Gartner which states that approximately 80% of enterprises will have used generative artificial intelligence (GenAI) application programming interfaces (APIs) or models by 2026. However, AI is a broad and ubiquitous term, and, in many instances, it covers a range of technologies. Nevertheless, AI presents breakthroughs in the ability to process logic differently which is attracting attention from businesses and consumers alike who are experimenting with various forms of AI today. At the same time, this technology is attracting similar attention from threat actors who are realising that it could be a weakness in a company's security while it could also be a tool that helps companies to identify these weaknesses and address them.

Try This Alternative to Proton Drive to Secure Your Data

As technology develops and our reliance on technology increases for education, work, or personal use grows, so does our need for privacy-focused providers to secure our data. Although numerous services are available, deciding which is right based on your needs can be challenging. However, it is crucial to subscribe to a secure service to handle your data, as more industries are becoming victims of data breaches each year.

Data Security and Privacy in Dental Technology

In the fast-evolving landscape of dental technology, prioritizing data security and privacy is paramount. As dental practices, like Elm Family Dentistry, increasingly embrace digital solutions, safeguarding sensitive information becomes a cornerstone for ensuring trust and compliance.

Anonymization: Safeguarding Sensitive Information - Permanently

What is anonymization? InfoSec teams can utilize anonymization to irreversibly scramble sensitive data values, thereby protecting an individual’s private information. If the sensitive information can no longer be linked to an individual, businesses have a better chance of saving on audits, complying with regulatory requirements, and scaling their ability to compete – all leading to revenue increases for your bottom line.

Data De-Identification: The Foundation of Data Protection

De-identifying data is what every data protection method is designed to do, making it the basis of effective cybersecurity. Common data fields that are de-identified by businesses would include names, birth dates, addresses and zip codes, National ID, and Social Security Numbers. By obfuscating sensitive data values through reversible and irreversible methods, your customers and patients can rest easy knowing their data can only be viewed by authorized parties.

Pseudonymization: Replacing Sensitive PII Values to Better Protect Your Data

What is pseudonymization? It’s one of many data protection methods that allow businesses to improve their sensitive data protection across systems by replacing values with pseudonyms. Learn more about this crucial data protection method and learn more about utilizing this method to boost your business’s cyber security posture.

Tokenization: Replacing Data Values One Token at a Time

What is tokenization? This method revolutionized the modern way we protect data. In today’s age, InfoSec teams can deploy keyless and reversible methods with tokens, which replace sensitive Personal Identifiable Information (PII) and store this information in both vaulted and vaultess token look-up tables. When the data is needed, it can be re-identified and accessed by the right parties, ensuring sensitive information remains protected. Watch above to learn more about this revolutionary data protection method.

Cloud Storage vs. Hard Disk Drive (SSD): Which is Better for Data Security?

Technology trends may come and go, but cloud storage has become a mainstay for efficient data management. Instead of relying on physical drives such as local SSDs, the cloud allows users to store their data securely in remote data centers. On the other hand, traditional storage methods, such as hard disk drives (HDDs), have been storage mainstays for decades. Through magnetic spinning disk technology, HDDs have been reliable for long-term storage.

What is DSPM (Data Security Posture Management) & Do You Need It?

Knowledge is power. Power is money. In the context of information systems and applications, knowledge is ingested, processed, and used as data. Data theft or loss can be devastatingly costly to a business. Data is one of an organization’s most valuable assets, and must be secured and protected as such.

Streamline your security workflows with these 3 shortcuts in Tines

Looking for ways to simplify your cloud DLP workflows in 2024? Read on for 3 ways that Tines—our go-to secure workflow builder—can make your resolutions a reality. First, let’s learn a little about how Tines works. In short, Tines helps users to create “stories” (aka workflows) that streamline communications, automate tasks, and more. Tines stories can take any number of twists and turns by: But how can you put these actions into practice?