Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

FAQ: What Are the DoD Requirements for Wiping Data?

In today’s digital age, destroying data is not as easy as it once was. Before the advent of computers, if you needed to destroy sensitive government information to prevent it from falling into the wrong hands, all you often needed to do was light some papers on fire. With computers, you might think that it’s a simple matter. After all, if you’ve ever accidentally deleted a file or had a hard disk crash, you’ve probably lost data and haven’t been able to recover it.

Safeguarding Classified Information

Safeguarding classified information is paramount to the security of any nation and its allies. However, modern collaboration tools and devices have made protecting it more challenging without the proper guardrails. Understanding classified information handling requirements and the technologies that can help enforce these obligations are the keys to preventing unauthorised access, dissemination and exposure of classified information.

Mobile Matters: Keep Your Data Safe

Some of you may remember when phones were primarily used for making phone calls. In today’s rapidly evolving digital landscape, our smartphones and tablets have transformed into multifunctional devices, serving as mini-computers, high-resolution cameras, and indispensable companions in our daily lives. They seamlessly keep us connected to the world, offering endless avenues for communication and entertainment.

AI, Advanced Analytics, & Cloud Migration: Top Trends in Data Modernization

Let’s dive into a world where data isn’t just growing — it’s exploding — setting the stage for an AI-driven future that’s as exciting as the next sci-fi blockbuster. With innovations like ChatGPT and Neuralink pushing the boundaries of what’s possible, we’re on the precipice of a data revolution.

Kheun Chan, Principal Security Architect at Iron Mountain on ensuring data flows only where it's supposed to

Welcome to our Data Security Innovators series, where we talk to security practitioners who are navigating the frontiers of security with novel processes and technologies. In this episode, we speak to Kheun Chan, Principal Security Architect at Iron Mountain. Iron Mountain is renowned as one of the world’s best secure information storage and management services, with 95% of the Fortune 1000 as customers of the company.

Data Brokering: A Thousand Things About Yourself

A recent report from Duke University's Sanford School of Public Policy has shed light on a concerning issue - data brokers are selling vast amounts of highly sensitive information about American military service members. This includes private data about active-duty personnel, veterans, and their families, encompassing sensitive health and financial details. Shockingly, these brokers even offer bulk data for individuals within geofenced military facilities like Fort Bragg and Quantico.

How to Define Objectives Under ISMS?

In today’s digital age, protecting your organization’s information assets is paramount. An information security management system (ISMS) plays a crucial role in this endeavor, providing a structured approach to managing and protecting company information. This article explores how an ISMS supports risk management, its key elements, the main security objectives, and how to define and make your organization’s information security objectives both measurable and actionable.

Done with traditional DLP? Here's how generative AI can help.

Since the widespread migration to the cloud, DLP has become an essential—yet often dreaded—tool for protecting data from leaks, breaches, exfiltration, and more. It’s no secret that traditional DLP solutions have a less-than-stellar reputation. Security teams are squeezed tighter than ever in terms of time and resources. Needless to say, adding more alerts on top of already daunting workloads is less than ideal. It’s time for a smarter, more sustainable form of DLP.