Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

7 Effective Security Measures to Combat Cyberterrorism

Cyberterrorism exists, but it is a concept that is difficult to pigeonhole. The story is similar to “physical terrorism,” where there are always shades of gray to consider – Was something an act of terrorism, or was it just an act of gratuitous malevolence? Many acts of terrorism are definable, and the same applies to cyberterrorism. However, the blurring of the lines is even more apparent with cyberterrorism.

CISO Advisory Board Response to The State of Data Security: Securing an Uncertain Future

Rubrik Zero Labs’ recent study accentuated several hard truths we think are important and warrant a response from Rubrik’s CISO Advisory Board. First, let’s confirm what many of us have already discussed: It’s not fun to be a CISO right now. There’s an overwhelming amount of expectation—from the board to business unit owners—to figure out how to grow and use data, but also keep it secure, and figure out what happens when it’s not.

Discover, triage, and remediate sensitive data issues at scale with Sensitive Data Scanner

Managing sensitive information in your telemetry data poses many challenges to governance, risk management, and compliance (GRC) teams and overall security. Organizations in healthcare, finance, insurance, and other fields must carefully adhere to strict compliance requirements. But sensitive data comes in many forms and moves between many endpoints, and as a result, it can easily become exposed in telemetry data.

Enhancing Developer Experience and Security Reporting on Workflows

In our previous blog post, we introduced Bearer’s new GitHub App and highlighted its seamless onboarding process and on-demand scanning capabilities. Today, we focus on how this app can significantly enhance the developer experience within Pull Requests (PRs) while providing critical reporting capabilities to security teams.

Security Fortified: Safeguarding Data with PostgreSQL Support Services

Data security is becoming a crucial concern for organizations of all types and sizes. With the increasing prevalence of cybercrime and data breaches, even small companies are finding it necessary to invest in PostgreSQL support services that can help them safeguard sensitive data while complying with industry regulations.

Permissions Auditing in Microsoft 365 and SharePoint

Regularly reviewing user permissions is important to reduce the risk of data overexposure and breaches. Overpermissioned users pose a significant security risk. Restricting access to only necessary information for individuals to perform their jobs can significantly reduce risk. By conducting regular permissions audits in Microsoft 365 and SharePoint, organizations can ensure that sensitive information access remains appropriate, safe and secure.

Your WordPress Data Exposure Risks

43% of all websites are built in WordPress (W3Techs). Custom WordPress sites rely on plugins, themes, and other components determined by the website administrators. Because these extensible components are often created by third-parties, each custom addition is a potential attack vector that needs to be monitored and updated to maintain a secure website. Website security is a critical aspect of your cybersecurity posture.