Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Protection

Understanding Data Protection Needs in a Cloud-enabled Hybrid Work World

Today, Netskope partnered with the Cloud Security Alliance to release the Data Loss Prevention (DLP) and Data Security Survey Report, a survey focused on data protection needs in cloud and hybrid work environments. Unsurprisingly, the report found that the biggest pain point organizations identify with trying to modernize their data protection strategy is that current DLP deployments show limitations when it comes to cloud and remote work use cases, and they are a nightmare to manage.

A Hitchhiker's Guide To Cross-border Data Protection

Imagine doing business in a bubble. You are an international company only allowed to make decisions using data collected within your country and by your business unit (BU). You also cannot share data with subsidiaries or third parties. It would be challenging to conduct day-to-day business, let alone innovate and grow. Fortunately, this isn’t the state of business today. Organizations transfer trillions of data points across borders daily.

Your DPO Questions Answered

Every business that collects personal data via a website, app, or even via the phone/post will find that they need the skills and expertise of a Data Protection Officer at some point to ensure safe and confidential data processing. But what is a DPO exactly? Do you really need one? And what if you don’t want to hire someone full time? Read on to find out more about the roles and responsibilities of the DPO and when to hire one to secure your data.

3 Ways To Address Your Kubernetes Data Protection Challenges

Kubernetes is an open-source container orchestration tool originally developed by Google for managing microservices or containerized applications across a distributed cluster of nodes. It is widely thought that “Kubernetes is key” to cloud-native application strategies. Kubernetes (K8s) runs over several nodes, and the collection of nodes is called a cluster. K8s clusters allow application developers to orchestrate and monitor containers across multiple physical, virtual, or cloud servers.

The Explainer: Five Things To Know About Data Tokenization

Tokenization hides data. Sometimes data must be hidden in order to satisfy compliance requirements and customers’ expectations for data privacy. A form of data protection, tokenization conceals sensitive data elements so should an organization’s data be breached, the visible tokenized data—essentially a replacement for the valuable data—means nothing.A hacker will only see characters that are meaningless.

They're Not Just Long Words: Anonymization And Pseudonymization Protect Data-driven Business

Spelling, let alone pronouncing, “anonymization” and “pseudonymization” is just the beginning. Vocabulary, however, will be the least of the challenges for organizations that ignore the business value created through the use of these data protection methods. Anonymization and pseudonymization are two ways to de-identify sensitive data, and each has a distinct purpose in the tightrope balance between fully using and fully protecting data and data privacy.