Maintaining Governance and Security in Multi-Tool Environments

The massive shift to hybrid cloud architectures means enterprises are choosing a multi-tool approach to IT. However, the new multi-tool world inevitably creates security and governance challenges. The more tools you add, the more complicated things ge… Continue reading Maintaining Governance and Security in Multi-Tool Environments

MS Teams: The Gateway Drug to Security Chaos

We all know the COVID-19 pandemic forced organizations to rapidly accelerate their adoption of collaboration solutions. For organizations already using Office 365 or Microsoft 365, Microsoft Teams was a readily available answer to the remote workforce… Continue reading MS Teams: The Gateway Drug to Security Chaos

Connected Data Stores Elevate the Requirements of Data Security and Governance Platforms

Since it is highly unlikely that my wife will read a blog on data security, I think I can safely share that she is a snoop around birthdays, anniversaries and holidays. My wife cannot stand the suspense of not knowing what gift might be in store. The gift’s value is not relevant; it is the […]

The post Connected Data Stores Elevate the Requirements of Data Security and Governance Platforms appeared first on Security Intelligence.

Continue reading Connected Data Stores Elevate the Requirements of Data Security and Governance Platforms

Egnyte introduces new features to help deal with security/governance during pandemic

The pandemic has put stress on companies dealing with a workforce that is mostly — and sometimes suddenly — working from home. That has led to rising needs for security and governance tooling, something that Egnyte is looking to meet with new features aimed at helping companies cope with file management during the pandemic. Egnyte […] Continue reading Egnyte introduces new features to help deal with security/governance during pandemic

Cleaning up the Active Directory Forest

Used by many organizations and enterprises, Microsoft’s Active Directory (AD) comprises several services that run on Windows Server to manage permissions and access to networked resources. Within the Active Directory configuration hierarchy, an AD For… Continue reading Cleaning up the Active Directory Forest

Data Democratization: Balancing Risk vs Reward Through Data Governance

Expanding employees’ access to the company’s data, known as data democratization, can be controversial. A more open attitude to data within the enterprise can give people the tools to fuel innovation and improve their bottom lines. However, it also can pose problems with security if not properly rolled out. As businesses work towards unleashing the […]

The post Data Democratization: Balancing Risk vs Reward Through Data Governance appeared first on Security Intelligence.

Continue reading Data Democratization: Balancing Risk vs Reward Through Data Governance

Interplanetary Networking (IPNSIG): Space Internet Governance

SPEAKERS Dr. Vinton G. Cerf, Chief Internet Evangelist, Google Dr. Scott Pace, Deputy Assistant to the President and Executive Secretary of the National Space Council MODERATOR Scott Burleigh, Principal Engineer, Jet Propulsion Laboratory, California I… Continue reading Interplanetary Networking (IPNSIG): Space Internet Governance

Sonrai Security Adds Governance Engine to Tool Based on Graph

Sonrai Security today added a Governance Automation Engine to Sonrai Dig, a platform that continuously identifies and monitors the relationship between identities and data that exist within a public cloud. Company CEO Brendan Hannigan said the Governa… Continue reading Sonrai Security Adds Governance Engine to Tool Based on Graph

Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption

The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of businesses as they are moving their workloads to the cloud gradually. IDC “expects 2021 to be the year of multi-cloud” as the global COVID-19 pandemic reinforces the need for […]

The post Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption appeared first on Security Intelligence.

Continue reading Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption