April 28 2025 | Cybersecurity News Unveiling ShardSecure Spark: Your Pathway to Ultimate Data Security in these geopolitically and economically challenging times! Jesper Tohmo Read more
December 15 2024 | File-level protection What Is File Encryption, and How Secure Is It? ShardSecure Read more
November 4 2024 | Encryption RSA and AES Have Been Broken. What’s Next for Cybersecurity? ShardSecure Read more
October 15 2024 | Data security Fortifying Data Security with ShardSecure and NIST-Driven Cyberstorage Solutions ShardSecure Read more
October 7 2024 The Fort Knox of Data: Ransomware Resilience and Exfiltration Prevention ShardSecure Read more
September 17 2024 | Encryption Are Your Encryption Products Up To Standard? Julian Weinberger Read more
August 6 2024 | Cybersecurity Industry Fortifying the Digital Fortress: Insights on Ransomware, Exfiltration, and More ShardSecure Read more
August 5 2024 | Cybersecurity Industry ShardSecure Recognized as a Sample Vendor in Two Gartner® Hype Cycle™ Reports ShardSecure Read more
June 16 2024 | Compliance What the New Texas Crackdown Means for Data Privacy Regulations Bob Lam Read more
June 1 2024 | Ransomware The Ransomware Gap: Going Beyond Disaster Recovery With Self-Healing Data Julian Weinberger Read more
April 22 2024 | Ransomware The New Ransomware Law That Could Change How Businesses Handle Cyberattacks Bob Lam Read more
April 16 2024 | Ransomware The Ransomware Chronicles: New Strategies and a Shared Solution Julian Weinberger Read more
April 5 2024 | Events The ‘Art of Possible’ and the Future of Cybersecurity Julian Weinberger Read more
March 11 2024 | Ransomware Top Ransomware Examples: Real-Life Threats and Mitigation Strategies ShardSecure Read more
March 4 2024 Understanding the 'Harvest Now, Decrypt Later' Threat and the Protective Shield of Microsharding Julian Weinberger Read more
February 18 2024 | Cybersecurity Understanding Cybersecurity for Financial Services ShardSecure Read more
February 7 2024 Navigating the SaaS Data Security Minefield with ShardSecure Julian Weinberger Read more
January 22 2024 | AI and machine learning Machine Learning and Cybersecurity: A Double-Edged Sword ShardSecure Read more
December 21 2023 | Compliance Data Privacy Compliance: An Overview of the Global Landscape ShardSecure Read more
December 17 2023 | Compliance A Guide to the Tennessee Information Protection Act ShardSecure Read more
November 30 2023 | Cybersecurity A Cybersecurity Carol: Cyberthreats Past, Present, and Future ShardSecure Read more
November 23 2023 | Data security Protecting Your Unstructured Data: A CISO’s Perspective Zack Link Read more
November 17 2023 | Data security Microsharding: Gaining a Competitive Edge in Data Security TAG Cyber Read more
November 10 2023 | Data resilience Information Resiliency: Ensuring Data's Survival in the Digital Storm TAG Cyber Read more
November 3 2023 | Compliance The Good, The Bad, The Nonexistent: Reviewing US State Data Privacy Laws ShardSecure Read more
November 2 2023 | Data privacy Advanced Data Privacy with Microsharding: A Modern Necessity TAG Cyber Read more
October 27 2023 | Data security Microsharding: Enhanced Data Security in an Insecure World TAG Cyber Read more
October 26 2023 | Data privacy 15 Data Privacy Statistics for Security-Conscious Businesses ShardSecure Read more
October 10 2023 | Compliance Understanding the American Data Privacy and Protection Act ShardSecure Read more
October 6 2023 | Compliance Understanding the New Florida Digital Bill of Rights ShardSecure Read more
September 7 2023 | Ransomware What Is Encryption-Less Ransomware, and How Can It Be Mitigated? ShardSecure Read more
August 24 2023 | Data privacy How the CCPA Will Shape Future Federal Privacy Regulations ShardSecure Read more
August 11 2023 | Compliance The EU-US Data Privacy Framework Was Just Approved. Why Are Some Companies Avoiding It? ShardSecure Read more
August 8 2023 | AI and machine learning Your AI Data Is Valuable… But Is It Safe? ShardSecure Read more
August 4 2023 | Data security Data Security in Agriculture: Six Surprising Facts ShardSecure Read more
July 21 2023 | Data security Five Reasons Why Data Privacy Is Vital for Biotech Companies ShardSecure Read more
July 11 2023 | Data security Top Five Data Security Threats in the Legal Sector ShardSecure Read more
July 7 2023 | Cloud Why Multi-Cloud Resilience Is More Challenging Than It Seems ShardSecure Read more
June 27 2023 | Cloud Financial Services in the Cloud: Challenges in Security and Resilience Bob Lam Read more
June 23 2023 | Data security The Current Landscape: Data Security in the Manufacturing Sector ShardSecure Read more
June 16 2023 | Case Study Ensuring Data Privacy and Security for Ultra-High-Net-Worth Families Joe Sorial Read more
June 13 2023 | Data security How Data Loss Protection Is Outpacing Traditional DLP Julian Weinberger Read more
June 9 2023 | Cybersecurity Industry What the Google SQL Flaw Tells Us About Data Access in the Cloud ShardSecure Read more
June 6 2023 | Cybersecurity Industry What Meta’s €1.2 Billion Fine Means for GDPR Compliance Julian Weinberger Read more
May 31 2023 | Data security How To Address Your Customers’ Data Security Requirements Julian Weinberger Read more
May 26 2023 | Compliance Why Adopt SOC 2? A Guide to Compliance and Its Benefits ShardSecure Read more
May 2 2023 | Data security The top data security threats to critical infrastructure ShardSecure Read more
April 11 2023 | Compliance What Is DORA, and Why Does It Matter for Your Company? ShardSecure Read more
April 4 2023 | Privacy Six Steps for Implementing Privacy by Design at Your Organization ShardSecure Read more
March 30 2023 | Data security Outplaying the Attackers: Data Security Through a Soccer Lens Pascal Cronauer Read more
March 24 2023 | Cost savings What Are Companies Doing To Cut Their Cloud Costs? ShardSecure Read more
March 20 2023 | Cloud How our customer cut costs and optimized their cloud investments ShardSecure Read more
March 16 2023 | Privacy How Does Privacy by Design Support Cross-Border Compliance? ShardSecure Read more
March 6 2023 | Cloud What You Need To Know About the Upcoming AWS Access Changes ShardSecure Read more
February 24 2023 | File-level protection What’s the Problem With Encryption Agents? ShardSecure Read more
February 15 2023 | Cloud Cost Savings in AWS: A Guide To Maximize Your Cloud Investments ShardSecure Read more
February 10 2023 | Cybersecurity Industry Six Trends in Building Resilience and Cutting Costs for 2023 ShardSecure Read more
January 26 2023 | Cybersecurity Industry KPMG and ShardSecure: Announcing Our Alliance Bob Lam Read more
January 26 2023 | Data resilience DLP is trending. What’s that got to do with microsharding? ShardSecure Read more
January 17 2023 | Staffing ShardSecure congratulates Julian Weinberger on his promotion to Field Chief Technology Officer Bob Lam Read more
January 6 2023 | Cybersecurity Crime Without Borders: What Can We Do About Global Cyberattacks? ShardSecure Read more
December 26 2022 | Cloud migration 7 Best Practices for Secure Cold Storage Migration Zack Link Read more
December 23 2022 From the Front Lines, the True Cost of a Data Breach Matt Baron, Client Director, Praesidium-Cyber Read more
December 21 2022 | Data resilience Applying RAID to the Cloud for Data Resilience Julian Weinberger Read more
December 19 2022 | Ransomware The Rise of Ransomware-as-a-Service: What It Means, and What We Can Do ShardSecure Read more
December 16 2022 | Compliance Expert Advice: Data Protection for GDPR and Schrems II Compliance Zack Link Read more
December 14 2022 | Cybersecurity Attackers Are Getting Smarter: What You Need To Know About Smishing and Vishing Alex Ryan Read more
December 12 2022 | Human Error Did I Do That? On Security Errors, Fear, and Shame ShardSecure Read more
December 9 2022 | Data resilience Reassessing Data Risk in the Cloud? A Chief IT Risk Officer's Advice ShardSecure Read more
December 1 2022 | Cybersecurity Industry Five Cybersecurity Predictions for 2023 Jesper Tohmo Read more
November 15 2022 | Defense in Depth What It Means When We Say “It’s Encrypted” Julian Weinberger Read more
October 27 2022 | Cloud IAM and security automation: How companies can stay safer in the cloud Anthony Whitehead Read more
October 25 2022 5 tips for CISOs & boards navigating the evolving regulatory landscape Zack Link Read more
October 24 2022 | Cybersecurity 10 spine-chilling cybersecurity statistics ShardSecure Ghost Writer Read more
October 13 2022 | Data resilience Data center resilience and risk assessment Julian Weinberger Read more
September 16 2022 | Data resilience Pivoting from infrastructure resilience to true data resilience Julian Weinberger Read more
August 10 2022 The chipmunks are coming: Appreciating the motivation of threat actors ShardSecure Read more
August 2 2022 | Cold storage Cold storage migration to the cloud is heating up for CISOs Bob Lam Read more
June 23 2022 | Business continuity Business continuity starts with a plan, not technology ShardSecure Read more
June 7 2022 | Ransomware When to microshard, when to encrypt, and when to do both ShardSecure Read more
May 10 2022 | Microsoft 365 ShardSecure with Microsoft 365: Five key user experience benefits Zack Link Read more
April 26 2022 | Compliance Protecting data in an evolving regulatory environment Lou Steinberg Read more
April 12 2022 | Cloud migration How “bring your own storage” moves cloud services forward Jesper Tohmo Read more
November 15 2021 | Compliance A thumbprint almost ended our vacation, or GDPR and the cloud Bob Lam Read more
May 20 2021 | Defense in Depth ShardSecure + ISACA webinar: Microshard™ technology, defense in depth for data ShardSecure Read more
April 22 2021 | Cybersecurity News DevOps data calls for new data obfuscation strategies ShardSecure Read more
April 1 2021 | Cloud migration Questions enterprises should be asking as they migrate to the cloud Robert Clyde Read more
December 21 2020 | Cybersecurity News For most companies, securing remote work is unfinished business ShardSecure Read more
October 12 2020 | Cybersecurity News National cybersecurity awareness month and the holiday shopping season ShardSecure Read more
September 2 2020 | Data Sensitivity Data sensitivity in international data governance & security landscape ShardSecure Read more
August 25 2020 | Ransomware Ransomware attacks surge amid search for COVID-19 cure ShardSecure Read more
August 10 2020 | Cloud migration Microsharding: An innovative way to protect cloud data Robert Clyde Read more
August 7 2020 | Video Data security in cloud computing requires Microsharding™ to augment encryption TAG Cyber Read more
August 7 2020 | Video Sensitive data demands better data security controls than just encryption TAG Cyber Read more
July 28 2020 | Data Sensitivity Vaccine hacks shed spotlight on data privacy and security ShardSecure Read more
April 23 2020 | Report Encrypt, tokenize or mask? ShardSecure offers a new take 451 Research Read more
April 13 2020 | Cloud migration How can we split public cloud adoption from data security events? ShardSecure Read more
April 1 2020 | Cloud Heightened data security risks follow as millions work from home ShardSecure Read more
February 10 2020 | Data Sensitivity Why reducing data sensitivity is the best protection against cloud misconfiguration ShardSecure Read more
January 30 2020 | Cloud How to protect against the #1 cause of cloud data breaches ShardSecure Read more
June 1 2019 | Report Microsharding: a high performance alternative in data protection Warren Zafrin Read more