
The Future of Data Security is Zero Trust: Here’s Why
The modern enterprise is fluid, dynamic and distributed. The old network perimeter is gone. And threat actors bypass corporate defenses with ease—often simply using stolen or cracked credentials. This is the world that Zero Trust was designed for. A cybersecurity approach with a history dating back over a decade, it’s ... Read More

Data Security in 2025: Five Steps to Strategic Success in 2025
As 2024 comes to a close, IT security and business leaders will be braced for another challenging year ahead. In the long-term, economic uncertainty and geopolitical instability seem set to continue, creating the conditions in which threat actors thrive. They will increasingly have the tools at their disposal to launch ... Read More

How Financial Institutions Can Manage Mounting Digital Sovereignty Requirements
Financial services is among the most highly regulated of any industry – and justifiably so. As critical infrastructure, the sector provides services which, if interrupted or destabilized, could have a catastrophic impact on economic and national security. Increasingly, these regulations mandate not only cyber-resilience (eg the EU’s DORA) but also ... Read More

Boost Hybrid Cloud Strategy with Cloudera and comforte’s Data-Centric Security
Meta Description: Discover how data-centric security supports the hybrid cloud strategy of Cloudera Data Platform users. Learn about the benefits of hybrid cloud, data management, and secure data sharing ... Read More

Temenos Banking Ecosystem now Enhanced with Data-Centric Security
Vast quantities of customer data flow into banks every day and leveraging this data is key to securing growth in the modern banking landscape. The challenge that banks and other financial services providers face is how to securely unlock that data and use it to develop new revenue streams ... Read More

The Value of Data-Centric Protection in Google Cloud and BigQuery
Business leaders are increasingly adopting cloud-based analytics for decision-making. However, this approach comes with potential security and privacy risks. Although some users of public cloud services may find the built-in security features sufficient for their needs. Others, such as those operating in highly regulated industries, may require additional security measures ... Read More