Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Safeguarding Classified Information

Safeguarding classified information is paramount to the security of any nation and its allies. However, modern collaboration tools and devices have made protecting it more challenging without the proper guardrails. Understanding classified information handling requirements and the technologies that can help enforce these obligations are the keys to preventing unauthorised access, dissemination and exposure of classified information.

Mobile Matters: Keep Your Data Safe

Some of you may remember when phones were primarily used for making phone calls. In today’s rapidly evolving digital landscape, our smartphones and tablets have transformed into multifunctional devices, serving as mini-computers, high-resolution cameras, and indispensable companions in our daily lives. They seamlessly keep us connected to the world, offering endless avenues for communication and entertainment.

AI, Advanced Analytics, & Cloud Migration: Top Trends in Data Modernization

Let’s dive into a world where data isn’t just growing — it’s exploding — setting the stage for an AI-driven future that’s as exciting as the next sci-fi blockbuster. With innovations like ChatGPT and Neuralink pushing the boundaries of what’s possible, we’re on the precipice of a data revolution.

Kheun Chan, Principal Security Architect at Iron Mountain on ensuring data flows only where it's supposed to

Welcome to our Data Security Innovators series, where we talk to security practitioners who are navigating the frontiers of security with novel processes and technologies. In this episode, we speak to Kheun Chan, Principal Security Architect at Iron Mountain. Iron Mountain is renowned as one of the world’s best secure information storage and management services, with 95% of the Fortune 1000 as customers of the company.

Data Brokering: A Thousand Things About Yourself

A recent report from Duke University's Sanford School of Public Policy has shed light on a concerning issue - data brokers are selling vast amounts of highly sensitive information about American military service members. This includes private data about active-duty personnel, veterans, and their families, encompassing sensitive health and financial details. Shockingly, these brokers even offer bulk data for individuals within geofenced military facilities like Fort Bragg and Quantico.

How to Define Objectives Under ISMS?

In today’s digital age, protecting your organization’s information assets is paramount. An information security management system (ISMS) plays a crucial role in this endeavor, providing a structured approach to managing and protecting company information. This article explores how an ISMS supports risk management, its key elements, the main security objectives, and how to define and make your organization’s information security objectives both measurable and actionable.

Done with traditional DLP? Here's how generative AI can help.

Since the widespread migration to the cloud, DLP has become an essential—yet often dreaded—tool for protecting data from leaks, breaches, exfiltration, and more. It’s no secret that traditional DLP solutions have a less-than-stellar reputation. Security teams are squeezed tighter than ever in terms of time and resources. Needless to say, adding more alerts on top of already daunting workloads is less than ideal. It’s time for a smarter, more sustainable form of DLP.

Data Insecurity: Building Resilience in the Face of Cyber Threats

In today's digital age, organizations are using data in innovative ways to understand their businesses and generate new value, making data the lifeblood of every operation. As a result, data is growing at an unprecedented rate across on-premises, SaaS, and multi-cloud environments. However, this rapid growth presents significant challenges for organizations, as they often struggle to identify sensitive or regulated data, where it’s located, and who has access to it.

Number of Data Compromises Affecting U.S. Organizations Rises To 77%

New data summarizing the compromises of data in 2023 provides key details on who’s being targeted, what types of data is being compromised, and what attack vectors are being used. I’ve covered reports from the Identity Theft Resource Center (ITRC) – their coverage of attacks over the years has grown to include much more than identity theft.

ITAR Compliance Checklist

The United States government has established strict regulations to safeguard intellectual property and military superiority. Compliance with the International Traffic in Arms Regulations (ITAR) is imperative for companies involved with U.S. defense technologies and data. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.

Introducing Linea AI: A revolutionary AI-first approach to data security

The AI revolution that kicked into overdrive last year has taken the world by storm, and as the development and productization of Large Language Models and other AI technologies continue – the revolution shows no signs of slowing down.

Data Security Explained: Challenges and Solutions

Data is the most valuable asset for any organization, regardless of size or sector. Loss or corruption of financial reports, business plans and intellectual property can bring even a global enterprise to a standstill. Moreover, a wide range of compliance regulations mandate the organization protect information in accordance with data security best practices.

Your Data Has Moved to the Cloud - Can Your Security Strategy Keep Up?

In today's world, data is the lifeblood of every organization. From intellectual property to employee and customer data to competitive intelligence and more — if your data is stolen, it's your reputation, money, and business on the line. But the way we store and interact with data has changed over the years. It's no longer located inside a perimeter, on networks and devices your organization has total control over.

Safeguarding Sensitive Data: The Vital Role of Cybersecurity in Business Law Firms

In an era marked by digital transformation and increasing reliance on technology, cybersecurity has become a critical concern for businesses across all sectors. However, for law firms specializing in business law, the need to protect sensitive client information and maintain confidentiality is paramount. As custodians of highly confidential data, including intellectual property, financial records and sensitive legal documents, business law firms face unique cybersecurity challenges and must implement robust measures to safeguard against cyber threats and data breaches.

Best Practices to Address SharePoint Security Concerns

Modern enterprises are increasingly relying on cloud collaboration to enhance their business productivity, efficiency, and communication. While these cloud-based solutions offer numerous benefits, they also come with a range of potential security risks. Among these risks, enterprise SharePoint security concerns are some of the most significant. It is essential to adopt best practices that can mitigate these risks and safeguard your organization’s valuable data and assets.

Data Security Posture Management (DSPM): The Meaning, Importance, and How it Works

DSPM or Data Security Posture Management is the modern approach to securing the information ecosystem. It represents a pivotal shift from the traditional castle-and-moat approach focused on IT devices to one that is focused on data.
Featured Post

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional computers - could potentially turn data security on its head.

Data Modernisation in Telecom: From Reactive Protection to Proactive Opportunity

In our last blog, we discussed the many challenges faced by telecom organisations in this ever-changing regulatory and technical landscape. While it is clear to see the challenges the industry faces in this digital world, there’s also a unique opportunity to solve the many problems that hold them back.

Balancing Data Privacy, Regulations and Revenue in Telecom

The need to find the balance between providing a unique and tailored customer experience, ensuring data privacy, and adhering to market regulations has become more critical than ever for Communications Service Providers (CSPs). In a world where customers are more demanding, regulations are more stringent, and attacks are more sophisticated, it’s easy to see how telecom organisations deem balancing act challenging.