Ten state attorneys general are urging Apple to address privacy and security gaps in third-party applications available on the App Store that track, collect or store reproductive health data. The letter comes as scrutiny intensifies over how large tech firms handle sensitive health data.
Creativity and innovation give businesses a competitive edge. Some companies keep innovations as secrets, and because the secrets are of great value to those companies, they take steps to ensure the information is protected. A trade secret is a type of intellectual property, and it's often the key to competitive...
CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.
Netskope has built out a full SASE stack and helped enterprises secure their physical devices through the recent acquisitions of Infiot and WootCloud. Buying SD-WAN provider Infiot in August will boost the convergence of networking and security and help customers quickly on-ramp users in the cloud.
Co-founder and CEO Bipul Sinha has grown Rubrik's business with existing customers by more than 40% thanks to the company's unique take on data observability. The data security vendor has emphasized data availability and resiliency in the face of crippling ransomware and extortion-based attacks.
Digital identities a – particularly the TLS certificates throughout your organization – are used by
machines to authenticate machine-to-machine communications. But they also protect machines
through consistent, trusted encryption.
When these machine identities fail, organizations experience outages. Even...
Data doesn't move itself. People—whether they are negligent, compromised or malicious—move data in secure and risky ways. Legacy approaches to data-loss prevention (DLP), building walls around your critical data, fails in today’s always-connected world. This e-book explores the growing challenges of today’s...
Changing your data loss prevention (DLP) solution is a major transition that can feel overwhelming. But relying on DLP built for an earlier era of business can be just as costly and expose your organization to needless risk. Download this e-book for three compelling reasons to modernize your approach to DLP. It...
Cybersecurity and IT leaders globally are fretting about data protection. But investments in data loss protection (DLP) are inconsistent and, even with a legacy DLP solution, respondents still worry about being vulnerable to data loss. And the shift to remote and hybrid work has complicated the picture by widening the...
According to 451 Research’s Voice of the Enterprise, 'loss of control of sensitive data’ is reported as a top three potential issue with cloud solutions by 25.9% of survey respondents – outranking even the common concern for cloud provider lock-in.
The overall enterprise motion toward cloud adoption has been...
Referred to as the Data Mesh, this growing ecosystem of databases, data lakes and data services enable businesses to embrace data democratization and be data driven. It eliminates silos, unlocks innovation, and helps improve customer experience and company culture.
To truly harness these benefits, IT, DevOps, and...
With data taking the spotlight, there are important implications for security, privacy, and compliance teams. It’s not just your company that sees value in your data. There are many bad actors that also see value in your sensitive data too.
Your data and databases are the primary target for attackers. And with...
Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Richard...
Protecting the organization against email-borne threats is only becoming more difficult as attackers create new and more clever ways to fool users and embed threats and malware.
The best SEG solutions provide better protection than older products or those that are available with an email platform...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.