Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

The Role of Data Hygiene in the Security of the Energy Industry

We create massive amounts of data daily, from the exercise stats compiled by our wearable devices to smart meters used at our homes to reduce expense consumption to maintenance statistics of critical systems in industrial settings. If data creation continues at its present rate, more than a yottabyte (a million trillion megabytes) will likely be generated annually by 2030.

The 3 Major Shortcomings of Traditional DLP

As digital transformation continues to blossom and cloud adoption increases, we continue to see challenges crop up when it comes to traditional DLP solutions. Setting aside the architectural and operational complexity and high cost that comes with traditional DLP, practitioners recognize that existing tools aren’t able to keep up.

Managing Administrator Privileges for Australia's Essential Eight Cybersecurity Compliance

The concept of least privileged access has been around for a while and is widely understood. However, overprivileged users with more rights than necessary, such as administrators, continue to be a common source of breaches. It’s such a concern that the restriction of administrative privileges is included as one of the Australian Government’s Essential Eight Maturity Model to mitigate cybersecurity incidents.

Best practices for data security in cloud-native infrastructure

So far in this series, we’ve looked at the importance of securing an organization’s network, application components, and the endpoints that support them. In this post, we’ll look at the following best practices for protecting the different types of data that flow through these components. But first, we’ll look at how modern applications process and manage data, as well as common weaknesses and security threats to these systems.

Secrets Need to be Secured Everywhere Not Just in Code Repositories

Organizations are unaware of the prevalence of API keys and secrets throughout their systems, and how their users are sharing and using them. Even with security best practices and policies in place, the lack of awareness or compliance, as well as the possibility of human error means that API keys and secrets need protection regardless of where they are stored or shared.

Secure your organization with just-in-time access

Just-in-time (JIT) access is a cybersecurity feature where users, applications, or systems are granted access to resources only when needed and for a limited time. This approach limits the risk of privileged accounts gaining unauthorized access to sensitive data. JIT access is often used in conjunction with other security measures—such as multi-factor authentication and encryption—to provide a strong, layered defense against threats.

Developers access more sensitive data than you think!

13M developers write 14K lines of code each per year, touching sensitive data 16,847,298 times per year. If you need to understand how important, but also how difficult, it is to pinpoint sensitive data risks in a modern application stack, that is the number to keep in mind. In an effort to better explain the urgency of data security, we went in search of tangible numbers and came up with those above. But, how did we end up with them? Let’s take a look.

What is Data Room Due Diligence and Why Should You Care?

You have to wonder about modern technology that makes life much easier for you and your employees when going through not only business processes but in everyday life as well. You can take a look at a virtual data room that has been created specifically for going through due diligence. This will be your starting point for your journey into modern technology.