What We Can Learn from Data Breaches

You don’t have to go out of your way these days to learn about ongoing data breaches. You don’t have to pore over the online tech news sites with intention, or dedicate hours a day to researching cybersecurity incidents, in order to hear about brazen attacks against organizations and their ... Read More

Breach Prevention or Breach Mitigation? Choose Wisely!

| | data protection
So here’s a philosophical question: is it better to try to prevent something unfortunate from happening, even if the prevention success rate is much below 100%, or ensure that if something unfortunate does occur, the negative effects are limited and mitigated 100% of the time? ... Read More

4 Myths About Data-centric Security on the Journey to Zero Trust

If you’ve been tracking along with this entire blog series, you know that I’ve covered a lot of ground both technical- and business-wise. I started with the fact that Zero Trust (ZT) is a set of principles, not a formalized and codified technical standard. Lots of different people and organizations ... Read More

Starting with Data-centric Security: a Cost-Benefit Analysis

| | data protection
If you take a close look at the different reference architectures and best practices documents surrounding the Zero Trust methodology, you’ll find that the big question they all try to answer is where to start a ZT initiative. Once you and your organization understand and buy into the benefits of ... Read More

Applying Data-centric Security Early in your Zero Trust Initiative

| | data protection
My previous post in this series ended with a pretty definite statement: if data is all-important to hackers and other threat actors and is the crowning piece of the entire pillared structure that is the IT infrastructure, then that’s where you need to start you Zero Trust initiative. That’s what ... Read More

Data is the Prize – The Pillars of Zero Trust from Another Perspective

| | data protection
In fascinating 2018 testimony before a US congressional subcommittee on terrorism and illicit finance, Lillian Ablon provides insights into what threat actors are really after when they carry out cyber-attacks against their enterprise and agency targets. Obviously, different threat actors and groups have different motivations, and the testimony lays all ... Read More

Zero Trust Series Part 1: Why Data Protection is the Keystone for ZT

| | data protection
Zero Trust has a nice ring to it, in a firm and sort of non-compromising way. Not only does it sound serious, it sounds pretty final too. I mean, if you’re chastising somebody (like a wayward teenager) and say, “After this, I have zero trust in you, son!” Well, that ... Read More

The Big Question: Can Sensitive Data Truly be Protected in the Cloud?

You might be thinking that the answer is no, given the increasing number of cloud-based incidents occurring in the world and hitting national and international news outlets. Let me give you some good news, though. In short, the answer is yes. And yet, you may be wondering how you can ... Read More

Ensure InsurTechs Comprehension

| | data protection, Emea
The insurance industry has seen an increase of insurance technology companies (aka InsurTechs) expanding influence and presence over the last few years, especially in the EU.  To ensure you have a solid understanding of this potential disruptor we will give you a brief overview of what InsurTech is, what it’s ... Read More

How do you Protect Sensitive Data in the Cloud?

We are living in the age of data. Every business processes at least some data with varying degrees of complexity, in one way or another, however, despite the rising importance of data, we are not really seeing a proportional increase in data security. Consequently, the Verizon Business 2021 Data Breach ... Read More