Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Protecting data when migrating Confluence and Jira from on-prem to cloud

Atlassian made a big splash in cloud SaaS news when they announced that the company would stop selling new on-prem server licenses as of February 1, 2021. Upgrades of existing server licenses will continue to be available through the third quarter of 2022. Impacted services include Jira Software Server, Jira Core Server, Jira Service Desk Service, Confluence Server, Bitbucket Server, Crowd Server, Bamboo Server, Atlassian-built apps, and Atlassian Marketplace server apps.

Privacy Impact Assessment - PIA vs DPIA (GDPR)

Before GDPR, PIA (Privacy Impact Assessment) were a thing. This topic is around privacy impact assessment, its purpose, PIA vs DPIA and includes the underlying context of GDPR compliance. The monotony has been changed since the General Data Protection Regulation (GDPR) came into existence; it has significantly changed the concept of data privacy and security.

How to design Data Safety into your cloud

What is Data Safety, why is it important, and how do you go about designing into the foundations of your data environment? When you see the phrase "Data Safety", the chances are you think of Data Security. Most people do. What is far less likely is that you think of the other two pillars of Data Safety: Data Privacy and Data Governance. Clearly, all three pillars overlap.

Data Security & Governance for the Way You Work Today

The old cybersecurity stack is being pushed to the brink and no longer meets the needs of modern distributed workforces. It’s time for data security to adapt to the way we work today by putting data at the center of the security strategy. Learn how Egnyte is reimagining data governance and cloud security by delivering centralized visibility and control over your most sensitive content, wherever it’s accessed.

Healthcare cybersecurity: Our 6-step plan to secure healthcare data

The HIPAA Journal reported that “2020 was the worst ever year for healthcare industry data breaches.” In the US alone, there were 642 reported data breaches in which the number of records stolen exceeded 500, and in total, nearly 29.3 million healthcare records were exposed.

AccessPatrol USB Device Control Software Overview - USB Data Loss Prevention | CurrentWare

Don’t let a preventable data leak ruin your organization. Take back control over portable storage devices with a free trial of AccessPatrol. AccessPatrol is a device control software solution for preventing data loss to portable storage devices. In this video CurrentWare's managing director Neel Lukka provides an overview of the features available in AccessPatrol.

Automate and Unify Protection of Your SAP HANA Databases

Enterprises are undergoing a dizzying pace of digital transformation. For many organizations, real-time analytics and insights are critical to the success of their transformation, and SAP HANA has become their database of choice, making their protection a must. While SAP HANA provides a rich ecosystem of native backup and recovery tools to specialist DBAs, they are often not accessible by the backup and infrastructure teams.

Introducing Orchestrated Disaster Recovery for VMware Applications and Data

Unplanned downtime and data loss caused by natural disasters and modern cyber threats represent some of the most challenging events facing organizations today. Maintaining capabilities to reduce or eliminate impact in these scenarios is critical to any business continuity plan. Organizational resilience depends upon being able to protect and ensure the recoverability of data and services wherever and whenever disaster strikes.

How To Protect Rubrik CDM with Microsoft Authenticator

Rubrik’s Cloud Data Management (CDM) code features the ability to protect all of your Rubrik login accounts with two-step verification by using the industry-standard time-based one-time-password (OTP) codes. The Microsoft Authenticator app has extended its functionality, recently adding Microsoft account-based autofill capabilities across platforms. Here is a step-by-step guide on how to set it up on Rubrik CDM.