Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Ways to Protect Your Company's Valuable Life Sciences Data

Despite increasing cybersecurity awareness across the industry, Life Sciences firms continue to experience significant cyberattack volume. In fact, published reports indicate that average Life Sciences data breach now costs more than $5 million, while Life Sciences and Healthcare organizations perennially top the annual list of data breach costs by industry.

Artificial Intelligence: Thinking Beyond Artificiality with Larry Godec

Artificial intelligence (AI) is the hot topic of the moment, so we asked Tanium Executive Advisory Board member Larry Godec for his thoughts on generative AI in general and its more well-known applications, such as ChatGPT. Larry is the former CIO of First American Financial and a trusted advisor on AI topics to some of the world’s largest enterprises.

Debit Card vs Credit Card: Which Is More Secure Online?

Although both debit and credit cards provide easy methods of payment, credit cards have better fraud protection which makes them more secure to use online. Credit card fraud can easily happen through security breaches or cyberattacks that steal your payment card information. It’s important to use the most secure payment method to protect yourself from the damaging effects of credit card fraud.

RKVST for Dropbox - bring provenance to your Dropbox files

Bring provenance to your Dropbox files with RKVST. How can you prove that your work is original, authentic, and trustworthy? How can you protect it from being copied, manipulated, or misused? That’s where RKVST comes in, documenting the origin, history, and validity of your content, such as text, images, audio, or video, so you can prove where it came from. With RKVST you can: And with RKVST for Dropbox creating and recording the provenance metadata is as easy as a click of a button. Watch our video to find out how.

Voice of the SOC 2023- Key Findings

Join Tines founder Eoin Hinchy as he presents the key findings of The Voice of the SOC report 2023 and gives his insight in how we as a security community can address the more worrying trends while also capitalising on some of the positives. Having created the Voice of the SOC Analyst report in 2022, this year Tines went a step further opening up the survey to everyone in the security team right up to C-level and also surveyed security professionals across the world.

Voice of the SOC Report 2023 - Key Findings

The report follows 2022's Voice of the SOC Analyst. In 2023, we expanded the scope beyond the United States to include Europe, and sought perspectives from 900 security professionals up to and including the C-suite, rather than just analysts. This is a great opportunity to learn more about the biggest challenges facing security teams today, and how to solve them, so please do join us. Don’t worry if you can’t make it on the day - registrants will receive a recording after the webinar.

Unlocking Compliance: Quebec's Law 25 and Data Privacy

In today’s data-driven world, privacy and data protection are paramount. One of the most significant developments in data privacy is Quebec’s Law 25, also known as Bill 64, which was officially adopted on September 22, 2021. This landmark legislation represents a significant step in modernizing Canada’s privacy landscape and introduces several key provisions that businesses must be prepared to address.

Top tips: 3 common Zero Trust myths debunked

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. For the final week of Cybersecurity Awareness Month, we’re playing myth-busters and debunking three popular misconceptions about Zero Trust. Cyberthreats are becoming more and more brazen over time, and let’s face it—without a strong Zero Trust framework, your organization doesn’t have a dog in the fight.