Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Protection

A CISO's guide to sensitive data protection

As companies become more digitized, they must take appropriate steps in their application security processes to ensure data protection. The SolarWinds software supply chain attack, which was delivered to over 18,000 customers via the company’s own software update process, was the result of malicious code deployed in SolarWinds’ Orion network monitoring software.

Data privacy programmes deliver more than privacy adherence

Reduced costs, new revenue streams, greater customer trust and new markets The best data privacy programmes are granular. They assess the root of every data source, the nuances of every data use and the specifics of every way in which data is stored and shared. From that finite visibility, liabilities can be identified and appropriate remedies put in place that carefully balance the demands of the data subjects with the needs of the business.

Why Google's new privacy labels are important

When Apple released their privacy nutrition labels, it was seen as a key turning point in platform-level privacy. Even so, while Apple holds control of mobile device profits and industry mind share, they do not account for the majority of mobile devices globally—especially in developing countries. The iPhone is expensive, and therefor any of its privacy protections become a benefit only to those that can afford their devices.

Data Protection for SUSE Rancher Managed Clusters is Easy with CloudCasa

Why you Need Data Protection for Kubernetes Now that you have SUSE Rancher managing your Kubernetes applications, you need to consider how to further protect your application data. While Kubernetes is designed to provide a zero-downtime environment, service interruptions can happen, as well as human and programmatic errors and of course the dreaded ransomware and cyber-attacks.

Learn About CloudCasa - Kubernetes and Cloud Native Data Protection for Free

Would your team benefit from a simple and easy to use Kubernetes backup service that does all the hard work for you to backup and protect your multi-cloud, multi-cluster, applications and cloud native databases? A cloud-based service so easy to use that even developers won’t mind managing backups?

CloudCasa Security Overview

As a developer of copy data management and data protection products for 20+ years, Catalogic Software has considerable experience in securing and protecting our customers’ data. For our new CloudCasa backup service for Kubernetes and cloud native databases, security is built into every step of the service using a modern DevSecOps approach. In addition, we are adding new capabilities to meet specific enterprise security and data custodian and governance requirements.

Data Protection in the Age of Cloud Native Applications with CloudCasa - Part 3

In part 1 of this blog series on data protection for Kubernetes and cloud native applications, we addressed the need for Data Protection for Containerized Applications. Given that the leading Kubernetes distributions and managed cloud services do not include native capabilities for data protection and disaster recovery, service providers and enterprises need additional data management tools such as CloudCasa to provide these.

Do you need to protect your sensitive CAD files when collaborating with third-party vendors?

Cyberattacks are becoming a regular feature in the global market. The scale and variety of these attacks have grown considerably. The recent pandemic has spiked such attacks and many Covid-19 scams ranging from social media posts, smishing (small message phishing), phishing, ransomware, have skyrocketed this year.

Data Protection in the Age of Kubernetes

Software containers are at the heart of cloud-native business transformation initiatives. Containers are a natural evolution from virtual machines to a more granular and portable application environment in clouds. They are designed to support rapid development and deployment of cloud-native applications in what is called a DevOps model, a set of practices that combines software development and IT operations.