Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

nightfall

Your Definitive Guide to Data Security Posture Management (DSPM)

With high-profile data breaches making headlines on a regular basis, it’s no wonder that data security is top of mind for so many organizations. But what exactly is data security posture management (DSPM)? In this blog post, we’ll take a closer look at DSPM and how it can help your business keep its data safe and secure.

upguard

How Colleges & Universities Can Detect Data Leaks

‍Data leaks happen when sensitive data or personally identifiable information (PII) is accidentally exposed on the internet or dark web. Typically, data leaks only occur due to poor cyber hygiene, weak network security, or software misconfiguration that can lead to unintended data exposure. Without proper data leak detection processes, cybercriminals and hackers can exploit the exposed data without the organization’s knowledge using open-source intelligence (OSINT).

archTIS

How to Optimize Governance and Data Security in Microsoft 365 and Teams

The last few years have seen a huge shift in how organizations work with their data. The COVID pandemic accelerated a digital transformation as workers transitioned from the office to home-based and back into hybrid working environments. With this new set-up, collaboration is key to worker efficiency. However, the adoption of Microsoft 365 and Teams as a front-end platform has created new challenges for security teams.

nightfall

The Importance of Email DLP for Remote Organizations

Email is a popular channel for hackers: phishing attacks and malware usually originate from email. In 2022, Verizon found that 82% of breaches involved the human element: phishing emails and ransomware delivered via email continue to plague organizations of all sizes. For an organization with 1–250 employees, roughly one in 323 emails will be malicious, according to Comparitech.

nightfall

How To Create A Cloud Security Policy [+ FREE Template]

By one estimate, 60% of all corporate data is stored in the cloud. Businesses rely on cloud platforms like Slack, Google Drive, GitHub and Confluence to store data, share information, and run smoothly. Unfortunately, hosting all this information in one place provides an appealing target for hackers. Cloud programs are often vulnerable to data hacks, leaks, and insider threats.

nightfall

How Does Data Visibility Help With Data Loss Prevention?

Data loss prevention starts with data visibility. Without a clear idea of what data an organization has, where it lives, and how it’s used, data loss prevention (DLP) is essentially an exercise in futility. While the concept of data visibility may seem straightforward, in practice, it’s a challenge. The rise of remote work has led to a proliferation of devices and programs that prevent an IT team from getting a clear picture of where data lives.

nightfall

What Is Cloud DLP And Why Do You Need It For Remote Work?

Remote work is not going away. Depending on who you ask, experts believe 35% – 65% of the US workforce will continue to work remotely, permanently. Remote work was a trend that began well before the pandemic and will continue to be the preferred way to work for companies and employees alike. However, many companies were unprepared for the speed at which remote work became the preferred office structure. The pandemic forced businesses to adopt new tools and processes virtually overnight.

tripwire

What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide

Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace technology. While technologies such as the Internet of Things, and artificial intelligence have undeniable benefits, they have also presented complications. Managing your customers’ or site visitors’ data is a lot like having intimate access to their homes.