data security
Do you need cyber asset attack surface management (CAASM)?
In this video for Help Net Security, James Mignacca, CEO at Cavelo, talks about cyber asset attack surface management (CAASM), which Gartner recently identified as an emerging …
Backup is key for cyber recovery
Granular and air-gapped backup are critical to data recovery, when, not if, a business falls victim to ransomware. Those are among the key takeaways from an Enterprise …
The changing role of the CCO: Champion of innovation and business continuity
In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) …
Dark data is a pain point for many security leaders
BigID published a research report exploring today’s challenges organizations face with protecting their most valuable data. The study uncovered a number of critical findings: …
Consumers feel data leakage is inevitable so many have stopped caring
Imperva releases findings from a global study on consumer perceptions of data privacy and trust in digital service providers. In an increasingly digital world, consumers feel …
Data democratization leaves enterprises at risk
Today’s digital landscape has increased enterprises’ reliance on large datasets and analytics, underscoring the value of data for business. A recent report from NewVantage …
Paying ransom doesn’t guarantee data recovery
OwnBackup announced the findings of a global survey conducted by Enterprise Strategy Group (ESG) that reveals a staggering 79% of respondent organizations have been targeted …
People’s habits around personal and corporate data backup procedures
In this video for Help Net Security, Jon Fielding, Managing Director at Apricorn, talks about a survey of thousands of Twitter users, around their personal and corporate data …
The challenges of consumer data and PII usage
In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and personally identifiable information (PII). As …
Is IT ready for the metaverse? If not, it should be
Info-Tech Research Group has released a research to help IT departments identify risks in deploying metaverse solutions and how to mitigate them. This new research explores …
57% of people can’t recall if they ever backed up their important documents
Apricorn announced findings from a Twitter poll exploring device data and backup processes ahead of World Backup Day on March 31st. When asked to be honest with their …
Deploying pseudonymization techniques to protect health data
A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector …