How do you Protect Sensitive Data if you Can’t Even Locate it?

| | Data Discovery, data protection
Knowing what risks impact your business can give security professionals a deeper grasp of what data protection tools are required to effectively protect data stored within the perimeter. However, a major obstacle to mitigating risk and protecting sensitive data is that in many organizations, no one can say precisely where ... Read More

Pandemics Create New Attack Opportunities in Travel and Hospitality

Hospitality and travel data breaches in a pandemic create new risks and threats to citizens on a global basis. Data breaches from airline, travel, and hospitality IT and cloud platforms present a potential worst case risk in the current climate. A common pattern in pandemic management today relates to travel ... Read More

How to Pass the Test of “Reasonable Security” When It Comes to CCPA

| | Breach, CCPA, Compliance
Today, we see a third CCPA class action in short order, which points to very specific claims of security failure against the CCPA regulation. This time, it affects 73 million records – that’s pretty significant. While CCPA compliance focuses on citizens’ data privacy as a whole, which includes processes to ... Read More

Is the US Ready for Centralized Data Privacy Enforcement?

The recent news about a proposed bill to create a central data privacy enforcing body shines another spotlight on the high-risk, high stakes shifting ground that many businesses operate their engines of growth on – consumer data collection, analysis, and retention. The news will no doubt be a hot topic ... Read More

Compliance Headaches and How to Avoid Them

We are in a perfect storm. Data breaches keep happening, cyberattacks are getting more sophisticated and consumers’ awareness of these risks increases daily. It’s therefore no surprise that policymakers are cutting through this noise by implementing progressively more stringent data privacy laws. 2018 marked key milestones for several new regulations ... Read More
Security Boulevard
Server and Storage

Has storage and server encryption kept pace with modern IT to adequately reduce risk?

| | Data Security
Storage and server vendors seem to be stuck with the historical mindset of traditional data-at-rest encryption. Data from applications is exposed while in-use, but sits blissfully protected at-rest, only to be again exposed to a potential breach when applications need to access it once again. This is a recipe for ... Read More