How to ensure that the smart home doesn’t jeopardize data privacy?

The smart home has been much hyped for what feels a very long-time, but I think it is fair to say that the smart home era is now truly upon us. This status has been almost entirely driven by the rise of the smart speaker – the first truly mass-market s… Continue reading How to ensure that the smart home doesn’t jeopardize data privacy?

5 Data Security Challenges and How to Solve Them

  Nearly two-thirds of the global population will have internet access by next year, according to Cisco’s Annual Internet Report (2018-2023) White Paper. There will be 5.3 billion total internet users (66% of the global population) by 2023, up from 3.9 billion (51% of the global population) in 2018. With this growth in internet usage, […]

The post 5 Data Security Challenges and How to Solve Them appeared first on Security Intelligence.

Continue reading 5 Data Security Challenges and How to Solve Them

Do you need cyber asset attack surface management (CAASM)?

In this video for Help Net Security, James Mignacca, CEO at Cavelo, talks about cyber asset attack surface management (CAASM), which Gartner recently identified as an emerging technology. As companies moved to a hybrid workforce model, their assets wer… Continue reading Do you need cyber asset attack surface management (CAASM)?

The changing role of the CCO: Champion of innovation and business continuity

In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) and how to alleviate some of its burdens in today’s highly regulated worl… Continue reading The changing role of the CCO: Champion of innovation and business continuity

The Next Frontier for Data Security: Protecting Data in Use

Tremendous progress has been made over the last several years to protect sensitive data in transit and in storage. But sensitive data may still be vulnerable when it is in use. For example, consider transparent database encryption (TDE). While TDE ensures sensitive data is protected in storage, that same sensitive data must be stored in […]

The post The Next Frontier for Data Security: Protecting Data in Use appeared first on Security Intelligence.

Continue reading The Next Frontier for Data Security: Protecting Data in Use

Dark data is a pain point for many security leaders

BigID published a research report exploring today’s challenges organizations face with protecting their most valuable data. The study uncovered a number of critical findings: 84% of organizations are extremely concerned about dark data. This is data th… Continue reading Dark data is a pain point for many security leaders

Consumers feel data leakage is inevitable so many have stopped caring

Imperva releases findings from a global study on consumer perceptions of data privacy and trust in digital service providers. In an increasingly digital world, consumers feel trapped: sharing personal data is a requirement to use digital services, but … Continue reading Consumers feel data leakage is inevitable so many have stopped caring

Data democratization leaves enterprises at risk

Today’s digital landscape has increased enterprises’ reliance on large datasets and analytics, underscoring the value of data for business. A recent report from NewVantage Partners reveals 91.7% of IT and business executives out of 94 large companies a… Continue reading Data democratization leaves enterprises at risk

Paying ransom doesn’t guarantee data recovery

OwnBackup announced the findings of a global survey conducted by Enterprise Strategy Group (ESG) that reveals a staggering 79% of respondent organizations have been targeted by ransomware within the past 12 months. Of those organizations, nearly three … Continue reading Paying ransom doesn’t guarantee data recovery