Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

5 Ways to Protect Your Company's Valuable Life Sciences Data

Despite increasing cybersecurity awareness across the industry, Life Sciences firms continue to experience significant cyberattack volume. In fact, published reports indicate that average Life Sciences data breach now costs more than $5 million, while Life Sciences and Healthcare organizations perennially top the annual list of data breach costs by industry.

Unlocking Compliance: Quebec's Law 25 and Data Privacy

In today’s data-driven world, privacy and data protection are paramount. One of the most significant developments in data privacy is Quebec’s Law 25, also known as Bill 64, which was officially adopted on September 22, 2021. This landmark legislation represents a significant step in modernizing Canada’s privacy landscape and introduces several key provisions that businesses must be prepared to address.

Law 25 (Quebec's Bill 64) FAQs on Data Privacy

Quebec’s Law 25, also known as Bill 64, is a comprehensive data privacy law that introduces stringent requirements for organizations handling personal information. Non-compliance can have, and likely will have severe consequences for businesses, resulting in costly fines and reputation loss, which impact businesses greatly. Protegrity’s pseudonymization solutions can help organizations simplify Law 25 compliance and avoid fines.

Announcing beta support for PHP, alpha for Go and Python

PHP holds the bar as one of the most popular and sought-after technologies for web development. As W3Techs shows, PHP code is running on 76.8% of all websites around the globe. We are very excited to announce that the latest version of Bearer now supports PHP in Beta, with more than 50 rules already available, providing a good level of security risks and vulnerabilities coverage. For the PHP support in this release, we have included a strong focus on the popular Symfony framework.

Maximizing Microsoft Sensitivity Labels in M365, SharePoint, Outlook and more

Data governance and protection are crucial in safeguarding sensitive information. Proper classification and data labeling is essential to ensure that the right people access the right information. Failure to implement these practices can result in data breaches, financial loss, and harm to an organization’s reputation.

Leadership Less Involved in Cyber-Preparedness Despite a Majority of Orgs Thinking Data Loss from a Cyber Attack Likely in the Next 12 Months

You probably expect executive leadership to not just support cybersecurity efforts, but to be involved. New data shows organizations have a way to go until this is a reality. Even if an organization is completely supportive of the cybersecurity strategy, it can’t exist in a technical bubble only. It requires a lot of input – from planning to implementation – to ensure that required business objectives are met as security controls become part of operations and resiliency plans.

Key Management & BYOK in Microsoft 365 for GDPR Compliance

Microsoft Azure and Microsoft 365 are among the leading cloud services globally, but their limited Bring Your Own Key (BYOK) capabilities pose potential data security and compliance issues for organisations that must comply with the EU and global data sovereignty laws. Increased government concern over protecting sensitive personal, business, government and defence data in the Cloud has led to a complex regulatory landscape that aims to maintain control of citizen and government data.

Hidden Data Exfiltration Using Time, Literally

I was looking at my watch last week and my attention was moved towards the seconds over at the right of the watch face, incrementing nicely along as you’d expect. Now, I don’t know if I’d just spent too long staring at a debugger screen or if it was something in the air, but an idea dawned on me, related to all things command and control, data exfiltration, etc.