We were thrilled to have the opportunity to educate over 800 cybersecurity and compliance professionals last week when we partnered […]
As organizations have embraced DevOps to accelerate software development lifecycles, the need for access to production data has exploded accordingly. […]
In this article, originally published by InfoSecurity, Robert A. Clyde outlines how to take a critical inventory of existing data […]
Encryption has long been the primary method of protecting data. Now, at a time when a convergence of factors is […]
This post was initially published by our Senior Advisor, Robert Clyde, in InfoSecurity Magazine There has been relief around the […]
October marks the seventeenth annual National Cybersecurity Awareness Month as outlined by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). […]
As any organization tasked with storing and transmitting sensitive data knows, the associated compliance implications can be a minefield of complex rules, risks and expensive fines.
Last week, Bloomberg reported that hackers had managed to snag payment of 118 bitcoins (about $1.14M US at the time of the exchange) from Covid-19 researchers in early June.
Until recently, when it came to protection for cloud data, I considered encryption the primary method. Then a few months ago, I came across a new technology called microsharding which disrupted my viewpoint.
The global pandemic has also shone a spotlight on another type of highly sensitive data: vaccine research and associated medical records. As scientists across the globe search for a Coronavirus cure, data privacy and security have become a challenge all their own.
According to IDC Corp’s Worldwide Quarterly Cloud IT Infrastructure Tracker, total end user spending on IT products for public and […]
Over the last several weeks, organizations across the globe have scrambled to provide millions of employees with the tools necessary to work from home. For those employers for whom remote work has never been common practice, adapting for today’s conditions is not a matter of broadening existing security practices but of creating them on the fly. And the information at stake is some of the most sensitive traveling across the internet today.
Hardly a month into 2020, the cybersecurity news beat is already flush with headlines. One of the most notable came […]
There’s no doubt cloud adoption is becoming ubiquitous. The datasets and workloads that have been migrated to cloud versus those […]