Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

The safest data security approach for the healthcare industry

If you’re looking for a reason to make protecting legacy systems a priority for your healthcare organization, we’ve got 9.23 million for you. That’s the total number of US dollars lost by the healthcare sector to data breaches alone in 2021– and that number is increasing year on year. In fact, the healthcare sector has been the target of the costliest data breaches of all sectors – including financial, technology, and services – for 11 years.

What is Data Leak Detection Software?

Data leak detection software identifies an organization's data leaks – the accidental public exposure of sensitive data due to software misconfigurations and poor network security. Data leaks quickly become data breaches when cybercriminals identify and exploit this exposed data. The following scenario demonstrates the progression of a cyberattack facilitated by a data leak attack vector.

The Importance of Continuous Security & Compliance in SaaS Environments

We’re living in the era of “giga-breach,” where cloud data breaches can easily expose in excess of one billion records. As such, the stakes couldn’t be higher for cloud security teams seeking to secure cloud environments. That’s why it’s important to understand the key vectors driving data breaches today. Read on to learn more, or click the thumbnail below to join our upcoming webinar, where we’ll discuss these trends in detail.

Cybersecurity vs Computer Forensics: Same goal, different measures

Information security (infosec) should be at the top of the agenda for any business that operates in a data-driven and digital environment – and to be honest, which business today doesn’t? But when hiring for infosec positions, it’s important that business leaders understand the differences between cybersecurity versus a computer forensics role.

10 Essentials for Big Data Security

In today’s data-driven world, skilled developers are much sought out for their ability to build applications that serve the Big Data needs of organizations. The sheer size, complexity, and diversity of Big Data requires specialized applications and dedicated hardware to process and analyze this information with the aim of uncovering useful business insights that would otherwise be unavailable.

7 Best Practices for Data Loss Prevention

Most organizations have at least one thing in common: every year, they’re generating and consuming more and more data. Dealing with all this data can be overwhelming, and especially so for those organizations that haven’t fully embraced the digital transformation and the cultural shifts that come along with it. As your data grows, so too does the risk that your data will be exposed to unauthorized parties in a security incident called a data breach or a data leak.

Introducing NC Protect's New CUI Designator Labelling Capability for US Defense Requirements

Protecting Controlled Unclassified Information (CUI) is a top priority for companies that have government and defense contracts, especially with the changes being rolled out in CMMC 2.0. We’re pleased at announce a new NC Protect watermarking feature to support CUI Designator labelling capability to assist US Defense and the Defense Industrial Base (DIB) with meeting the new CUI document handling and tagging requirements. The feature will be globally available during the July 2022 timeframe.

A System Integrator's Guide to Delivering Zero Trust Data Security with Rubrik

The volume and frequency of ransomware attacks have increased significantly this past year. In fact, the number of ransomware attacks has nearly doubled in 2021 as compared to 2020. The impact of a breach is multi-fold and stretches well beyond the commonly acknowledged risks of downtime cost, impact on the brand, and the actual ransom paid. This has prompted a paradigm shift in how organizations and system integrators look at their cybersecurity strategy.

How Should Startups Build Their Tech Stack?

At the beginning of every startup’s journey, the question plaguing every technical founder and their team is how to build their tech stack. A lot of thought must go into this question because it informs how the startup will adapt to the demands of business growth and any necessary adjustments or pivots of the business. In a recent webinar, we discussed this question in detail with Jim Walker of Cockroach Labs.