Data Security
The 5-Question Test to Assess Your Readiness to Manage Insider Threats
An insider threat is a cyber security risk that originates from within any organization that is being targeted by attackers. Often, insider threats involve a current or former employee, or business associate, ...
For Cost-Conscious Compliance Reporting, Rethink Your Data Retention Capability
Staffing costs required to generate reports for compliance audits are high, but the time required to generate the reports themselves is not necessarily to blame if you have suitable access to your ...
SaaS Eliminates Barriers to Applying Security Controls to Your Entire AWS and Azure Data Repository
Businesses today widely regard data as “the new oil,” the most valuable resource on earth. At the same time, we are in the midst of the most dynamic IT landscape in history ...
Organizations Lack Visibility Into Cloud Access
Do you know who is accessing your data in the cloud? According to a study conducted by Laminar, one in three respondents didn’t know if a third-party actor was able to successfully ...
The Distinctions Between Data Privacy and Data Security
Enterprises should separate data security and privacy by taking steps toward creating a comprehensive data protection framework. Unfortunately, data security and privacy concepts are often confusing and used interchangeably. Inseparable from one ...
What is Attack Surface Management and How Has it Changed?
The cyber threat landscape changes every day. The amount of data an organization stores, the number of employees that access the network remotely and external threats all play a significant role in ...
Data is Being Exfiltrated by Employees
An analysis of security breaches involving exfiltration of data by internal employees published today by CyberHaven, a provider of data protection tools, found that, on average, only 2.5% of employees exfiltrate data ...
7 Ways Good Data Security Practices Drive Data Governance
As more organizations continue with digital transformation plans, their ability to be good stewards of the data for which they are responsible becomes more difficult. They are generating more data, more data ...
Three Keys to Securing Shadow Data
What is shadow data? Shadow data is any data contained anywhere in your entire data repository that is not visible to the tools you use to monitor and log data access. Shadow ...
Five Steps to Integrating a Data Repository Vulnerability Assessment Into A WAF–Driven Vulnerability Management Program
A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and ...