Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Recent AstraZeneca Breach Illustrates Risk of Credential Leakage Across Cloud Apps

Yesterday, TechCrunch broke a story about pharmaceutical giant AstraZeneca, which experienced a leak affecting sensitive patient data. We think this incident is worth reviewing to learn more about how data exfiltration risk is distributed across the entirety of an organization’s SaaS infrastructure.

4 Steps for Defining Data Classification Levels and Policies

Data classification is an important business process. It makes it easier to apply data protection, helps employees understand what data is sensitive, and, importantly, which data can be made public. Unfortunately, many organizations provide employees with access to far more data than is needed. The oversharing of information with employees is a huge security risk.

The Essential Guide to Secrets Scanning

In today’s digital world, data breaches are becoming more and more common. In fact, recent studies found that a large majority of breaches are caused by stolen secrets & credentials, such as API keys. API keys are used to access data and resources from another application or service. They are typically used to connect two applications so that they can share data. For example, if you use a weather app on your phone, that app likely uses an API key to access the Weather Channel’s data.

The Essential Guide to Securing Your Data During Cyber Security Awareness Month

Cybersecurity awareness is an increasingly hot topic, especially during this year’s Cyber Security Awareness Month. There are many things individuals and organisations can do to improve their awareness around security, helping to protect data confidentiality. In this blog post, we will discuss some essential tips for securing your data coming to the end of this important month.

FORTUNE-Favored Data Protection Services for Financial Institutions

FORTUNE-recognized data privacy and protection solutions allow financial institutions the tools and security to improve data storage, flows, and protected usage within minutes. Discover how Protegrity Vautless Tokenization works wonders for organizations, and check out our finance-catered data protection solutions today.

Kintent's Frank Kyazze Takes On Data Connectors Dallas, Identifies Industry Frustration with Security Audits

Recently, we caught up with Frank Kyazze, Privacy Director here at Kintent, to chat about his experience at the Data Connectors conference in Dallas last month. Frank had the opportunity to serve on the “Protecting Against Cyber Attacks” discussion panel while in attendance. Frank took part in the panel, discussing how now more than ever, it is imperative for organizations to be vigilant against bad actors.

From Access-centric Security to Data-centric Security

In the early days of internet security, an access-centric security model made sense. Access lists on routers were complemented by firewalls and, later, intrusion detection systems. Given the processing capacity available at the time, this was absolutely adequate and appropriate for protecting a website, even with e-commerce. But that was the 1990s, and the internet has become so much more than websites with some shopping capabilities. Now, it’s the backbone of our society.

Encryption Key Management in Microsoft 365

Encryption is an essential means of protecting sensitive information and is required for certain types of data under many regulations. As more companies move to the Cloud and introduce Microsoft 365 (M365) applications like Teams and SharePoint Online to their communication and collaboration channels, the potential for data getting into the wrong hands grows exponentially making encryption strategies essential.