Business Continuity Planning: How Data Security Can Help to Minimize Disruption

Business Continuity Planning: How Data Security Can Help to Minimize Disruption

Business disruption is inevitable today. And increasingly it’s down to cyber incidents. Attacks caused $10.3bn in losses last year, in cases reported to the FBI alone. Even this figure is likely to be just the tip of the iceberg. With so much at stake, organizations need to look at ways ... Read More
Why the Business Impact Analysis Has Become a Critical Part of Cyber-Risk Planning

Why the Business Impact Analysis Has Become a Critical Part of Cyber-Risk Planning

| | data protection
Running a business is a continuous process of risk management. And as organizations come to rely like never before on their IT operations, cyber-related risk has risen to become a critical area of focus. An increasingly critical part of risk assessment and management is the Business Impact Analysis (BIA): a ... Read More
Protecting Your Enterprise Data from a Coming Cyber Storm

Protecting Your Enterprise Data from a Coming Cyber Storm

| | data protection
There’s no better way to understand the biggest threats to enterprise cybersecurity than spending a few days at Infosecurity Europe. The region’s largest cybersecurity conference and trade show, held each June in London, invites CISOs and industry luminaries from across the globe to share their insight. Worryingly, the consensus at ... Read More
A Data Security Platform Leader: What KuppingerCole has to Say About comforte

A Data Security Platform Leader: What KuppingerCole has to Say About comforte

Tech innovation moves pretty fast. But as the landscape continues to evolve and expand, it becomes increasingly difficult for IT buyers to find the time do effective due diligence on prospective suppliers. Given the critical importance of security tools to mitigating serious business risks, the stake couldn’t be higher. This ... Read More
Are IT Leaders Suffering from a False Sense of Security?

Are IT Leaders Suffering from a False Sense of Security?

IT and security leaders face challenges on multiple fronts today. On the one hand, there are insatiable business demands for more digital transformation to support. These gathered pace during the pandemic. But in the face of strong economic headwinds, they continue today as a means to drive greater efficiencies and ... Read More
Why Data Protection is Critical to the New U.S. Cybersecurity Strategy

Why Data Protection is Critical to the New U.S. Cybersecurity Strategy

While the threat landscape moves at a sometimes dizzying speed, there are some parts of the cyber-sphere which have been ossified for decades. One is the relative agility of threat actors versus those tasked with defending networks and tackling cybercrime. Another is the apparent inefficacy of market forces at improving ... Read More
Cyber-Criminals Are Innovating: It’s Time to Hit Back with Data-Centric Security

Cyber-Criminals Are Innovating: It’s Time to Hit Back with Data-Centric Security

The technology industry can move at dizzying speed. But in a space where change is the only constant, one trend has persisted over the years: a cyber arms race between attackers and defenders. While one side has the combined weight of numbers, the other has been historically more successful due ... Read More
Privacy-by-Design Becomes an ISO Standard: a New Driver for Data-Centric Security

Privacy-by-Design Becomes an ISO Standard: a New Driver for Data-Centric Security

Consumer trust in online services is a growing preoccupation of today’s boardrooms. That’s because customers are increasingly prepared to walk if they don’t like what they see. In fact, 71% of consumers told PwC last year that they’re unlikely to buy from a company that loses their trust. This might ... Read More

How to Complete a Cloud Security Assessment

Cloud computing is driving a new post-pandemic wave of digital transformation across the globe. Gartner forecasts spending on related services will reach nearly $600bn in 2023 as a result, a 21% year-on-year increase. But the cloud also brings with it a new set of security risks for enterprises which threaten ... Read More

European IT Experts Call for Digital Sovereignty: comforte AG Calls for New Start of Gaia-X

Wiesbaden, Germany - 26 October 2022 - Over 80 percent of IT experts call for more digital sovereignty in Europe. To illustrate, more than a third (35 percent) describe an independent European IT security technology as "very important." This is the result of a Censuswide survey conducted by comforte AG ... Read More

Secure Guardrails