The latest News and Information on Data Security including privacy, protection, and encryption.
2020 has been a very challenging year for teams and organizations across the world. This has been especially true for security teams, who’ve been responsible for managing the technological risks associated with their organization’s response to the pandemic. With security teams focused on mitigating the seismic impacts that the pandemic has had on their organization’s infrastructure, some of the security problems that emerged before the pandemic have been overlooked.
Earlier this year, the news broke of a new method that attackers were using to infiltrate Google Drive.
Kubernetes clusters have become the go-to solution for hosting applications in the cloud. Most cloud providers offer Kubernetes services, such as the Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (Amazon EKS), or Google Kubernetes Engine (GKE). But are you spending too much on compute resources in the cloud? Is your load pattern complex and difficult to predict? Is the load growing inconsistently or are you running applications on-demand that could cause sudden bursts?
User privacy and cybersecurity are two terms that often get used interchangeably when we talk about protecting our information on the internet. However, privacy and security are different areas of practice – only recently have these two areas come to intersect. In 2018, Harvard Business Review reported, “[P]rivacy and security are converging, thanks to the rise of big data and machine learning.
As workforces continue to evolve and adapt to the COVID-19 pandemic, the door is open for organizations to hire workers from anywhere around the country to offer their skills remotely as needed, often as a freelancer or gig worker. While this outgrowth of the burgeoning gig economy stands to benefit many businesses in need, it’s important that you assess your risk of utilizing gig workers and freelancers.
Most organizations are aware that data loss prevention must be a top priority – but few understand how different tools and policies must be leveraged in combination to create complete, 360-degree protection for critical data. Data loss prevention (DLP) has traditionally focused on securing data on devices – laptops, phones, and internal company networks.