Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

How much money is spent on cybersecurity?

Businesses have never been more vulnerable than they are today. While cybercrime cost companies an already whopping US$300 billion in 2013, damages have since skyrocketed to US$945 billion in 2020. That’s 300% growth in just a short span of seven years. The worst part is, that we can expect this number to continue rising exponentially in the coming decade.

What Does Defense-in-depth Mean and How Does it Bring Infrastructure and Data Security Together?

With the rise of ransomware and cyber attacks, the term defense-in-depth has risen to the forefront, but what exactly does it mean? At its core, defense-in-depth is a protection mechanism for network security–an approach that involves layering or using multiple controls in series to protect against possible threats. This layered concept provides multiple redundancies in the event systems and data are compromised.

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms

We’re excited to announce Nightfall’s partnership with Cribl, the high scale, data processing and observability platform. Cribl’s platform gives companies greater value out of their data by serving as the core plumbing connecting all of your data platforms, allowing users to set up workflows and extract essential data for processing, analysis, or storage.

7 Ways to Secure Sensitive Data on a USB Flash Drive

Over 20 years ago, USB flash drives, also known as thumb drives, were regarded as a breakthrough in portable data storage technology. Today, they are seen as a major security risk. If you must use a USB flash drive for data storage, there are ways to improve your data security. Read on to learn how to secure your thumb drive. If you’re aware of sensitive data and its storage requirements, skip ahead to our top 7 tips for securing your USB flash drive.

Netskope and Google Chrome Enterprise: Driving Better Context for Securing Data

When defining security policies, it is critical to know who the user is and what their privileges should be based on their role, and whether the device itself or the state of the device at the time of connection is in a known good state.

What is ePHI? A Guide to electronic Protected Health Information (ePHI)

ePHI stands for electronic protected health information. Electronic protected health information is protected under the Health Insurance Portability and Accountability Act of 1996, commonly known as HIPAA. ePHI security is governed by the HIPAA Security Rule. With the rise of telehealth, covered entities need to understand the requirements for safely transmitting, storing, and using ePHI to be compliant with the Security Rule and to protect a patient’s privacy.

What is the HIPAA Security Rule?

Title II of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) has two key provisions: the Privacy Rule and the HIPAA Security Rule. The Privacy Rule establishes standards for protecting certain health information, or PHI. The Privacy Rule requires those organizations that are governed by HIPAA (covered entities) to implement safeguards to protect the privacy of PHI, and gives individuals the right to access and share their health records.