Traditional frameworks for regulated data protection have failed despite decades of effort, and enterprises need to move from reactive SOC-centered approaches to collaborative boundaries that keep data secure without hindering innovation, said Scott Montgomery, vice president of federal at Island.
Our SOC has seen all kinds of real-world incidents: a hacker breaks into a logistics company via exposed RDP; a physician’s stolen credentials are used to log in from a shady workstation and snake through a network; an attacker sets up sneaky inbox rules to maintain access from a phished user. Are these...
Join data experts as they talk about their technical predictions for this year and look back on how well they did last year. The discussion will involve hot topics such as data security in the age of AI and AI-driven simplification of product usability
Federal regulators have issued a final rule that sets financial disincentives for healthcare providers that commit information blocking - or practices that they know are unreasonable and likely to interfere with patient access to electronic health information.
FTP made its first appearance in 1971, and it hasn’t changed much over the years. Although it has become the standard for business-to-business file transfers, poor FTP implementation practices have left many businesses with severe security and management issues. There’s a better way. Download the white paper to...
File Integrity Monitoring (FIM) is a technology that monitors for changes in files that may indicate a cyberattack. In many organizations, however, FIM mostly means noise: too many changes, no context around these changes, and little insight into whether a detected change actually poses a risk. Download your copy...
Organizations continue to move their workloads to multiple cloud providers and face a number of challenges. Whether it be infrastructure concerns or avoiding dreaded data silos that can lock business intelligence away from the center of the organization, even enterprises that carefully plan their implementations can...
Do any of these statements apply to your organization? Initially, you relied heavily on on-premises data centers. Then, the need to scale and innovate brought you to the cloud, but not without challenges. Your workloads are predominantly on-premises, but you're moving some of your data, apps, and services to the...
IBM has bought a startup founded by a longtime security leader in the Israeli Prime Minister's Office to ensure personal identifiable information isn't left unprotected. The deal will ensure sensitive data isn't exposed in public cloud data stores or SaaS apps like Slack, SharePoint or Office 365.
Creating a culture of cybersecurity across a healthcare enterprise can be challenging, but it’s critical to patient safety. The days of leaving cybersecurity solely on the shoulders of IT departments are long gone as purchasing decisions get made by department heads across the organization, many of which include...
The economic downturn has laid bare just how much of a disaster special purpose acquisition companies have been for the cyber industry. Despite this, confidential computing security vendor Hub decided to try its luck with a SPAC. So far, Hub's time on the Nasdaq Stock Exchange hasn't gone well.
Maintaining compliance with strict data privacy regulations while relying on non-compliant paper-based processes or insecure legacy systems can be nearly impossible. As is juggling multiple web form collection tolls and legacy systems that don't integrate or scale results in data silos. Inefficiency and paper...
Good data stewardship requires a comprehensive approach to fairness, transparency, and relevancy in data collection practices, in addition to adherence to robust legal and security requirements. Download this white paper to learn about: The trust gap and how to bridge it; The relationship between data stewardship...
Varonis has dedicated most of its engineering resources to SaaS since the onset of COVID-19 to provide more automation to customers, says CEO Yaki Faitelson. The company has focused on delivering robust data protection to customers without them having to dedicate hardware or personnel to the task.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.