Data Security
Purdue University’s CERIAS 2021 Security Symposium – Yoon Auh ‘s ‘NUTS: The Beta Demo, NUTS Technologies Inc.’
Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel ...
Purdue University’s CERIAS 2021 Security Symposium – Jordan Mauriello’s ‘Understanding Attackers and Motivations’
Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel ...
Data Privacy Laws Add Complexity to Securing the Cloud
There are 12 states currently considering new data privacy laws or considering making updates and changes to laws that are already in place. The Virginia Consumer Data Protection Act (VCDPA), for example, ...
How to use the Gartner® 2022 Strategic Roadmap for Data Security Platform Convergence
“It is not the strongest species that survive, nor the most intelligent, but the ones most responsive to change.” – Charles Darwin Evolution and innovation form the basis of most modern business ...
By the Numbers: The Cost of Insider Data Breach vs The Cost of Protection
The global business data security landscape has become dramatically more challenging over the last few years. One of the main reasons for this is insider threats, as reported in the 2022 Cost ...
Identity Management Challenges of M&A
Recent research revealed the number of mergers and acquisitions (M&A) reached approximately 62,000 globally in 2021, up an unprecedented 24% from the previous year—and 2022 is projected to have significantly higher numbers. However, ...
Healthcare Providers Need to Increase Budgets for Cybersecurity
The past few years have emphasized just how important cybersecurity is. As cybercrime reached record heights and more companies went digital, industries realized their current security efforts fell short. Healthcare is a ...
3 Steps to Putting a Modern Database Security Solution into Practice
As a Senior Security Solution Engineer, experience has shown me that there are no magic bullets when it comes to stopping data breaches. They are going to happen. What makes a data ...
Automation is the Top Cloud Security Priority
Two years of pandemic-forced remote work has shown how much organizations depend on cloud computing. Employees want to work at home, convinced they are more productive from a remote office than at ...
5 Ways to Determine if you do Cybersecurity or Cybersecurity Theater
For a sentient species, humans, in general, have curious ideas when it comes to reckoning and responding to risk. For example, studies show using seat belts when driving in automobiles save lives ...