How Private Cloud Enables Data Security

Calling today’s modern business environment data-driven is stating the obvious. Data is at the core of most, if not every, business strategy, and for good reasons. Data allows leaders to base their decisions on facts, trends and statistics rathe… Continue reading How Private Cloud Enables Data Security

Can security and compliance for managed database services be simple?

Actual Tech Media recently released a new entry in its Gorilla Guide series for IT professionals, focused on simplifying security and compliance for Database as a Service (DBaaS). The Gorilla Guide To® Securing Database as a Service (DBaaS) features Im… Continue reading Can security and compliance for managed database services be simple?

CISO’s Guide to Secure Software Development

To better protect personal data and ensure information security, organizations should be taking advantage of vulnerability assessments and measuring against application security benchmarks. These application security validations and certifications ensu… Continue reading CISO’s Guide to Secure Software Development

Ensuring Security and Compliance in AWS RDS with CDS

If you use AWS RDS, your organization is part of a worldwide trend. Forward-thinking companies everywhere are embracing database-as-a-service (DBaaS) to help bring new applications and services to market faster, or to reduce the cost and complexity of … Continue reading Ensuring Security and Compliance in AWS RDS with CDS

Getting Started With Cloud Data Protection

Warning: Businesses can get addicted to the cloud. It might start with a small experiment; just one application and no critical data. Next, scattered employees start messing around in the cloud, shadow IT-style. In the end, all your data has gone clou… Continue reading Getting Started With Cloud Data Protection

Taking a Data-Centric Approach to Cloud Security

The pandemic and resulting migration to remote work emphasized the importance of having a digital transformation process in place. The companies that did so appeared to be the companies that had the smoothest transition. Cloud computing played a pivot… Continue reading Taking a Data-Centric Approach to Cloud Security

Cloud Security Myth #3: The best security keeps threat actors from getting in.

Good security not only fortifies the entry points, it ensures that a data breach reveals nothing useful. It protects the data itself.
The post Cloud Security Myth #3: The best security keeps threat actors from getting in. appeared first on Protegrity.
Continue reading Cloud Security Myth #3: The best security keeps threat actors from getting in.

Is FedRAMP Criticism Fair?

Although FedRAMP has recently been criticized for lacking clarity and efficacy, any attempt to reduce risk to information in the cloud should be considered worthy in the face of increasing cybersecurity threats.
The post Is FedRAMP Criticism Fair? appe… Continue reading Is FedRAMP Criticism Fair?

Imperva Makes Major Expansion in Application Security

When Imperva announced in 2018 it would acquire the application security solution provider Prevoty, a company I co-founded with Julien Bellanger, I knew it would be a win-win for our industry. Prevoty’s flagship product, Autonomous Application Pr… Continue reading Imperva Makes Major Expansion in Application Security