Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Read more about the commercial surveillance vendors threat and its ecosystem and learn how to protect from it. Continue reading Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Data residency: What is it and why it is important?

Data residency is a hot topic, especially for cloud data. The reason is multi-faceted, but the focus has been driven by the General Data Protection Regulation (GDPR), which governs information privacy in the European Union and the European Economic Area. The GDPR defines the requirement that users’ personal data and privacy be adequately protected by […]

The post Data residency: What is it and why it is important? appeared first on Security Intelligence.

Continue reading Data residency: What is it and why it is important?

Paying ransoms is becoming a cost of doing business for many

Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with data recovery deficiencies compounding the problem, according to Cohesity. In fact, most companies have paid a ransom in the… Continue reading Paying ransoms is becoming a cost of doing business for many

Data security posture management vs cloud security posture management

“A data breach has just occurred”, is a phrase no security professional wants to hear. From the CISO on down to the SOC analysts, a data breach is the definition of a very bad day. It can cause serious brand damage and financial loss for enterprises, lead to abrupt career changes among security professionals, and […]

The post Data security posture management vs cloud security posture management appeared first on Security Intelligence.

Continue reading Data security posture management vs cloud security posture management

Australian Organisations Struggling to Resolve Tensions Between Personalisation, Privacy

Australian organisations are so focused on preventing data breaches that they’re unaware that the concern of most of their customers has more to do with privacy. Continue reading Australian Organisations Struggling to Resolve Tensions Between Personalisation, Privacy

Data Security: Leveraging AI for Enhanced Threat Detection and Prevention

By Uzair Amir
In today’s ever-evolving cyberspace, organizations face an ever-increasing number of cyber threats. Malicious actors are constantly seeking to…
This is a post from HackRead.com Read the original post: Data Security: Leveraging AI fo… Continue reading Data Security: Leveraging AI for Enhanced Threat Detection and Prevention

Security considerations during layoffs: Advice from an MSSP

Navigating layoffs is complex and difficult for many reasons. Not only do human resources and direct managers bear the onus of responsibility when conducting exit conversations, but security teams should also make the necessary preparations for monitor… Continue reading Security considerations during layoffs: Advice from an MSSP

If you prepare, a data security incident will not cause an existential crisis

Why is it that when a company becomes aware of a potential data security incident, the team working on it (and others who are made aware that “something” is going on) have an immediate and overwhelming feeling that the company is doomed? And yet, when … Continue reading If you prepare, a data security incident will not cause an existential crisis

Data security and cost are key cloud adoption challenges for financial industry

91% of banks and insurance companies have now initiated their cloud journey, a significant increase from 2020, when only 37% of firms had embarked on their cloud transformations, according to Capgemini. However, this high rate and its corresponding inv… Continue reading Data security and cost are key cloud adoption challenges for financial industry

5 common data security pitfalls — and how to avoid them

Data protection has come a long way. In previous years, it was considered a “nice to have” and a line item on the budget further down the page. Today, it’s top of mind for almost every CIO or CISO across all industries. Yet many organizations are caught in the crosshairs of cybersecurity challenges, often due […]

The post 5 common data security pitfalls — and how to avoid them appeared first on Security Intelligence.

Continue reading 5 common data security pitfalls — and how to avoid them