Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

The Future of Sustainability Requires Protecting Important Data Everywhere

While it might seem initially abstract, sustainability and data security are symbiotic. Allow me to explain. Regardless of the action or industry, critical data touches everything. Whether data is being used in pharmaceutical research, financial records, or intellectual property, securing it is the common imperative. This is especially true as it moves through various access points, the cloud, applications, the web, and various other transactions.

UK Security Policy Framework and Government Security Classifications Compliance

The UK government’s Security Policy Framework (SPF) outlines the expectations and requirements for security measures to be implemented across UK government departments, and external agencies handling government information and data assets. The framework covers various aspects of information security, including governance, risk management, technology and services, and culture and awareness.

Why Your Business Needs a Data Loss Prevention Strategy

Being a business leader in today’s business environment is no walk in the park. With over 2,200 cybersecurity attacks occurring daily, the task of protecting valuable business data adds an extra layer of complexity to your plate. How do you safeguard your crucial data, ensuring it’s not lost or compromised? You need a comprehensive Data Loss Prevention (DLP) strategy fortified by the best IT security software.

The Ultimate Guide to Classifying Exposed Credentials and Secrets

When looking for programmatic secrets, it’s not easy to figure out what is truly sensitive and how high-risk it is. There are many different types of secrets and credentials, and the context makes a difference. For example, there could be public URLs with tokens in them, public UUIDs, or credentials used in frontend code — these could all be considered API keys or secrets, but not necessarily at the same degree of sensitivity/severity as something like AWS credentials.

5 Guiding Principles to protect your IP effectively with Zero Trust

Zero Trust is the new Buzz word in the cybersecurity arena. Ever since, Forrester Analyst, Kindervag introduced the term Zero Trust in his article “Zero Trust Architecture”, traditional security measures have become obsolete. Zero Trust is a security framework that is based on an “I Trust No One” principle; it doesn’t matter if the user is within or outside the organization. A user is not granted access unless he/she is authenticated and authorized first.
Featured Post

GDPR - the benchmark for a global privacy framework

With the 5th anniversary of GDPR looming, this regulation continues to be a game-changer, setting the precedent for privacy and data laws around the world. In fact, the United Nations Conference on Trade and Development (UNCTAD) recently reported that 71% of countries now have data protection regulations in place and a further 9% have legislation in development. Countries such as Vietnam and Saudi Arabia have recently introduced new privacy laws. But, as we reflect on the anniversary of GDPR's introduction, just this week we've seen the first billion-dollar fine issued. So, what does this mean for data privacy moving forward?

Data loss prevention for developers

A security violation in the form of a data breach can create costly damage to a company's reputation. But what exactly is a data breach? The European Commission has divided data breaches into three distinct categories — confidentiality breaches, integrity breaches, and availability breaches: In this article, you'll learn more about what a data breach is and how you can prevent data breaches when designing and developing your software.

Australia's Defence Strategic Review and Data Centric Security

Australia recently released the 2023 Defence Strategic Review (DSR) which identifies investments required to deliver the Australian Defence Force posture required by 2032-33. In this blog, we explore the new DSR requirements and their impact on Defence and industry security practices.