Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule

The Gramm-Leach-Bliley Act, known as the GLBA, was passed in 1999 under President Clinton. The goal of the GLBA was to update and modernize the financial industry. Today, it’s primarily used to protect customer and consumer information, with steep penalties for financial institutions that violate its privacy rules. Here’s what you need to know about the GLBA and its regulations.

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams' Efficiency

Our team has been hard at work with continuous updates to improve and streamline the Nightfall DLP platform. We wanted to share with you the latest platform updates guaranteed to improve the speed at which security administrators and teams will be able to remediate incidents. Here’s what’s new.

Cloud Penetration Testing Services: How Safe Is Your Business Data?

Businesses are increasingly moving their data and applications to the cloud. While this offers many benefits, it also creates new security risks.#cloudsecurity #cloudpenetration Cloud penetration testing is a process of identifying and exploiting vulnerabilities in a cloud-based system. By identifying these weaknesses, businesses can protect themselves against malicious attacks and ensure that their data is safe

Things to Ask Your SSE Vendor: Episode 2: Does the ZTNA service offer DLP for private apps?

When it comes to private apps, data protection is critical. In this video see how SSE can be used to prevent employees and third-parties from downloading data, without the need for separate remote browser isolation technologies. Get ready to ask your vendor about their ability to protect private data from getting into the wrong hands.

DevSecOps: How to bring data security into the development workflow

DevSecOps refers to the integration of security controls across the whole software development lifecycle. It is first and foremost an organizational culture, enabled by processes and tools, where development teams share the responsibility for delivering secure software with the security team. This differs from organizations where development and security responsibilities are completely siloed in distinct teams.

Introducing Data Security Posture Management (DSPM) Platform

You’re a cloud-based company, your entire business model relies on cloud data and your cloud environment is VERY precious to you, correct? That’s why you invest all of your resources into protecting this environment from the outside world. You want to make sure that the perimeter between your cloud data and the outside world is 100% safe, I get it. But what if I told you that your goal is to protect your crown jewels, a.k.a - the data itself?

How to protect your sensitive data with automatic classification and labeling

This is a data-driven era. Every day tons of data are generated and it is a herculean task to manually provide security to all the data that is produced. Large enterprises generate huge amounts of data that are maintained by ERP systems like SAP. Transactions with third-party vendors and partners happen almost every day with lots of data being exchanged.

How does sensitive information end up in observability platforms?

Observability (logs, traces, metrics) is a core tenet to building strong software systems. Logs are used to debug issues and check on system activity, traces provide valuable insights into system performance and architecture, and metrics allow engineering teams to closely track business metrics within their systems.