The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first […]

The post The Importance of Modern-Day Data Security Platforms appeared first on Security Intelligence.

Continue reading The Importance of Modern-Day Data Security Platforms

How Breached Companies Become the Face of Change

I’ve always told my kids that everyone makes mistakes. What really matters is how you handle them and that you learn from what happened.  SolarWinds followed the same thinking in how it handled its 2020 breach. Not only did the company write its comeback story to help improve its reputation, but it is also working […]

The post How Breached Companies Become the Face of Change appeared first on Security Intelligence.

Continue reading How Breached Companies Become the Face of Change

Getting Lost in an Encryption Maze? Try a Key Management System

Encryption is an essential part of any data security strategy. A key management system (KMS) can make encryption easier by enabling you to transform data to indecipherable cyphertext and control who can access it in clear text. That helps keep data secure from unauthorized use, alteration, exfiltration or deletion. While encryption is a great tool […]

The post Getting Lost in an Encryption Maze? Try a Key Management System appeared first on Security Intelligence.

Continue reading Getting Lost in an Encryption Maze? Try a Key Management System

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

This report discusses new ransomware, that targets Windows, Linux and ESXi systems: Luna written in Rust and Black Basta. Continue reading Luna and Black Basta — new ransomware for Windows, Linux and ESXi

Data warehouse services: What to consider before choosing a vendor

The data warehouse is used as a single source of truth for an organization’s data. But before you choose a data warehouse vendor, there are some things to consider, including your business needs.
The post Data warehouse services: What to consider befor… Continue reading Data warehouse services: What to consider before choosing a vendor

What You Need to Know About Data Encryption Right Now

You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you roll your eyes because you have the good intention of taking care of […]

The post What You Need to Know About Data Encryption Right Now appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Encryption Right Now

Data Protection: What Needs to Be Protected?

Where is your organization’s data? From global data centers to PCs to mobile apps, data is strewn all over the place. So how do you protect it all?  You can’t encrypt everything, right? It’s too expensive and time-consuming. Even the most stringent regulations don’t demand that level of data protection. For example, GDPR focuses primarily […]

The post Data Protection: What Needs to Be Protected? appeared first on Security Intelligence.

Continue reading Data Protection: What Needs to Be Protected?

Data Security Along Every Stage of the Journey

Let’s say you’re planning a train robbery in the Old West. Your posse can jump on board at the station, on the route or at the last stop. The same is true of today’s data robbers. There are three main states in which data exists across an enterprise: at rest, in motion and in use. As […]

The post Data Security Along Every Stage of the Journey appeared first on Security Intelligence.

Continue reading Data Security Along Every Stage of the Journey