Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Protection

It's Time for a Federal Data Privacy Law in the U.S.

New state-level data privacy laws just keep coming. By the end of 2023, California will transition to the CPRA, and residents of Virginia, Colorado, Utah, and Connecticut will be covered by more expansive state privacy laws. With 10% of U.S. states covered by data privacy legislation by the end of next year, it’s clear there’s a need for federal legislation as well. I’m pleased to see reports of positive momentum on this topic in Washington.

What is the Primary Method for Protecting Sensitive Data?

Securing sensitive data in today’s digital world has become increasingly complex and challenging, especially if parties practice poor data management, network security, encryption methods, or endpoint protection. As cyber attacks continue to grow, it’s absolutely necessary to maintain stronger cybersecurity practices.

The role of the DPO just got bigger and more powerful

Traditionally, we find the DPO (Data Protection Officer) in large and very large enterprises. Small and Medium-sized businesses most probably do not have a DPO. But that is going to change now. Why? After nearly two years of deliberations, the Joint Parliamentary Committee (JPC) finally chaired the Personal Data Protection (PDP) bill, 2019 in the Indian Parliament. This bill will ultimately pave way for the strongest data protection law in the world’s largest democracy.

Featured Post

Four Takeaways as the European Union's General Data Protection Regulation (GDPR) Turns 4

May 25 2022, marked four years since the European Union's General Data Protection Regulation (GDPR) went into effect. Although the scope of the law is limited to personal data originating from activities in the European Economic Area, the ensuing requirements have had a global impact. This is evident in similar laws that have been proposed or passed and measures multinational organizations have taken to comply with privacy requirements. In parallel, there has been a convergence of a principles' based approach to cybersecurity in many jurisdictions worldwide.

5 Questions to Ask When Evaluating DSPM Solutions

Data protection solutions, and in particular, Data Security Posture Management (DSPM) platforms, should be built to effectively map, monitor, and protect your organization’s most valuable asset — your data. But not all cloud data security and compliance tools offer the same advantages, and not all will be suitable for your business’s unique data requirements.

Top 5 Benefits of Cloud Data Protection Platform

Making money is the ultimate goal of any corporation but not losing money is just as important. According to IBM, the average cost of a data breach is $4.24M, a substantial impact on your bottom line. And according to Gartner, by 2025, 60% of organizations will use cybersecurity risk assessment as the primary factor in choosing business partners. You cannot go any further without adequate cybersecurity solutions.

8 Data Protection Best Practices for Data Backup Day, and Every Day

Originally created when a journalist had his digital livelihood ruined by a cyber-attacker in 2012, World Backup Day has gained commercial significance as organizations manage ever-larger data volumes and face a higher risk of data breaches.

7 Essentials Every Data Protection Strategy Requires

Data protection, once a marginalized subsection of the cybersecurity industry, has increasingly become a major concern, especially for companies deploying Cloud based applications. GDPR, CCPA, PIPEDA - The list goes on but they all have one thing in common - A focus by regulators worldwide on addressing the issues presented by the use of digital big data.

Continuous Data Protection at Rubrik

Rubrik Continuous Data Protection (CDP) helps our customers protect mission critical VMware workloads with near-zero Recovery Point Objective (RPO). Recovery operations are available in both local and remote locations. It also integrates seamlessly with Rubrik Orchestrated Application Recovery to provide near-zero RPO and low Recovery Time Objective (RTO) disaster recovery for our customers.