The 5-Question Test to Assess Your Readiness to Manage Insider Threats

An insider threat is a cyber security risk that originates from within any organization that is being targeted by attackers. Often, insider threats involve a current or former employee, or business associate, ...

For Cost-Conscious Compliance Reporting, Rethink Your Data Retention Capability

Staffing costs required to generate reports for compliance audits are high, but the time required to generate the reports themselves is not necessarily to blame if you have suitable access to your ...

SaaS Eliminates Barriers to Applying Security Controls to Your Entire AWS and Azure Data Repository

Businesses today widely regard data as “the new oil,” the most valuable resource on earth. At the same time, we are in the midst of the most dynamic IT landscape in history ...
encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

Organizations Lack Visibility Into Cloud Access

Do you know who is accessing your data in the cloud? According to a study conducted by Laminar, one in three respondents didn’t know if a third-party actor was able to successfully ...
Security Boulevard
The Distinctions Between Data Privacy and Data Security

The Distinctions Between Data Privacy and Data Security

Enterprises should separate data security and privacy by taking steps toward creating a comprehensive data protection framework. Unfortunately, data security and privacy concepts are often confusing and used interchangeably. Inseparable from one ...
What is Attack Surface Management and How Has it Changed?

What is Attack Surface Management and How Has it Changed?

| | Data Security
The cyber threat landscape changes every day. The amount of data an organization stores, the number of employees that access the network remotely and external threats all play a significant role in ...
API, ChatGPT, exfiltration API security Salt Security APIs social media

Data is Being Exfiltrated by Employees

An analysis of security breaches involving exfiltration of data by internal employees published today by CyberHaven, a provider of data protection tools, found that, on average, only 2.5% of employees exfiltrate data ...
Security Boulevard

7 Ways Good Data Security Practices Drive Data Governance

As more organizations continue with digital transformation plans, their ability to be good stewards of the data for which they are responsible becomes more difficult. They are generating more data, more data ...

Three Keys to Securing Shadow Data

What is shadow data? Shadow data is any data contained anywhere in your entire data repository that is not visible to the tools you use to monitor and log data access. Shadow ...

Five Steps to Integrating a Data Repository Vulnerability Assessment Into A WAF–Driven Vulnerability Management Program

A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and ...