Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Singapore's PDPA Penalties Set to Increase Starting Oct 1

While the Singapore Personal Data Protection Act (PDPA) 2020 Amendment phases came into effect on Feb 1, 2021, starting on October 1, 2022, the maximum financial penalty for breaches of PDPA will be increased. Here’s what you need to know for the next phase of PDPA and how to ensure your information security practices are compliant to avoid penalties.

How to reduce your exposure & secure your data in the cloud in 5 quick ways

More companies are switching from on-premises systems to public cloud services, ensuring long-term growth and digital resilience. But as their implementations grow, they begin to realize that their exposure to cyberattacks and other risks grows as well. Cybersecurity is an essential practice for successful businesses. Adapting to business growth is a good problem to have, but without an eye on cloud security, that growth could cost you in the long run.

How to Back Up Your Data: 6 Effective Strategies to Prevent Data Loss

Having a plan to back up your data is one of the most important processes to protect the data in the event of a cyber attack. Should a malware or ransomware attack occur, you can boot a saved backup and restore your data to its previous state. Some organizations might use cloud-based solutions like Google Drive or Dropbox, while others prefer to keep their backups on an external hard drive. However, to ensure total data security, your backup strategy should include multiple solutions.

What is Data Theft? 8 Tips & Tricks to Prevent Losing Your Data

Data theft is a major cybercrime whose growth has been fuelled by rapid digital advancements in recent years. It involves the illegal storage or exfiltration of data or financial information. This can include passwords, algorithms, software code, proprietary technologies, or other sensitive data. To help you better protect your organization against data theft, this article will discuss what data theft is, how it occurs, and how you can prevent it.

How small businesses can defend against common cybersecurity attacks

Managing a small business can often feel like having 100 tabs open at once. Between handling client relations, organising taxes, and keeping up with day-to-day operations, cybersecurity (particularly data security) tends to fall along the wayside. Not because business owners don’t care, but because there is simply too much to care about. For small businesses, priorities often lie with directing their resources toward creating sustainable revenue streams.

Nightfall AI Raises $40 Million Series B to Expand Cloud Data Protection Platform

New funds from WestBridge Capital, Next Play Capital, Bain Capital Ventures, and Venrock will be used for hiring, growth, and expanding product integration San Francisco, Calif. – Nightfall AI, the industry’s leading cloud data loss prevention platform, announced today it has closed $40M in Series B funding.

Cyber Threats - The New Norm in Data Security

These are some of the opening words in the new survey published by ISMG and HelpSystems in the ‘Data Security Survey 2022’. The survey explores how COVID19 has permanently changed how CISOs approach Data Security. It is an important study because it recognises that in a world which is in a rush to return to ‘normal’ (whatever normal is now), change has come, and we need to respond to it.

Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

With the introduction of various compliance requirements such as HIPAA, PCI and GDPR (just to name a few from around the world), there is an increasing need for organizations to determine where their sensitive data is located, secure access to it and protect it accordingly. There are many products that incorporate the ability to Discover and Classify data. NC Protect is no different.

All You Wanted to Know About Data Security Fabric

Data is one of the most valuable assets for modern organizations. The right type and quality of data allows companies to resolve problems and improve business performance; it guides enterprise decision-making and drives business strategy. Data is also vital to improve cybersecurity, maintain regulatory compliance, and strengthen the competitive posture. In short, data matters. Organizations must protect their data assets from unauthorized access, compromise, and theft.

How to Establish Effective Information System Security Plans

Information ecosystems in the modern era are extremely complicated. Large amounts of data must be sent quickly and securely among thousands of networks’ applications, databases, and servers. That data, particularly sensitive information, should be protected at all costs against potential security incidents.