data security
Educational organizations use cloud apps to share sensitive data outside of IT control
Many educational organizations are at risk of data security incidents during the current period of working from home and virtual learning, a Netwrix report reveals. Weak data …
New third-party healthcare data rules: Increased access alongside privacy considerations
It would be an understatement to say that 2020 is a monumental year for healthcare. The COVID-19 pandemic brought many aspects of care to the forefront – from technology and …
Home workplaces introduce new risks, poor password hygiene
Entrust Datacard released the findings of its survey, which highlights the critical need to address data security challenges for employees working from home as a result of the …
Protecting corporate data in popular cloud-based collaborative apps
Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business …
Consumers will opt for competitors after a single ransomware-related service disruption
While most consumers are taking necessary security precautions to protect their online accounts, businesses may not be doing enough to protect their information – …
Despite spending more on compliance, businesses still have basic IT weaknesses
There is a misalignment between data privacy regulation spending and business outcomes, according to Tanium research. Specifically, as businesses spend tens of millions on …
Surge in remote working reveals concerns around unprotected endpoints
Millions of US businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks. New research from Tanium …
Zoom in crisis: How to respond and manage product security incidents
Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management’s commitment for secure products, the respect for user privacy, the honesty of …
GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations
As many organizations are still discovering, compliance is complicated. Stringent regulations, like the GDPR and the CCPA, require multiple steps from numerous departments …
APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade
Five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and mobile devices running Android …
Encryption is finally being used primarily to protect personal data rather than just for compliance
As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal …
Threat detection and the evolution of AI-powered security solutions
Ashvin Kamaraju is a true industry leader. As CTO and VP of Engineering, he drives the technology strategy for Thales Cloud Protection & Licensing, leading a researchers …