Data Security Along Every Stage of the Journey

Let’s say you’re planning a train robbery in the Old West. Your posse can jump on board at the station, on the route or at the last stop. The same is true of today’s data robbers. There are three main states in which data exists across an enterprise: at rest, in motion and in use. As […]

The post Data Security Along Every Stage of the Journey appeared first on Security Intelligence.

Continue reading Data Security Along Every Stage of the Journey

Zero Trust or Bust: What It Is and Why It Matters to Data Security

How many different ways can data be compromised? First, both external and internal threats can target it. External threats can come in the form of malware or ransomware. Meanwhile, internal threats can come from malicious insiders working from behind trusted accounts. Insiders can become a threat simply by clicking a phishing link or being tricked […]

The post Zero Trust or Bust: What It Is and Why It Matters to Data Security appeared first on Security Intelligence.

Continue reading Zero Trust or Bust: What It Is and Why It Matters to Data Security

Zero Trust: Bringing Privileged Access and Data Security Analytics Together

Who owns the data in your organization? If you’re like many, there’s a chance it’s fragmented. Maybe legal owns governance while security owns data security. IT, legal, security and line-of-business owners might share tasks. Perhaps there is no real data governance or oversight at all. What we hear from people across all industries, though, is that […]

The post Zero Trust: Bringing Privileged Access and Data Security Analytics Together appeared first on Security Intelligence.

Continue reading Zero Trust: Bringing Privileged Access and Data Security Analytics Together

Highly Regulated or Not, These Data Security Use Cases Still Apply

In light of recent news-making breaches, we can see there really is no industry immune from data breaches. While I do not want to be doom-and-gloom, manufacturing, consulting, entertainment, retail, consumer goods, hospitality, transportation – these sectors together make up 47% of all data breaches. In fact, consulting and other services made up 14% of […]

The post Highly Regulated or Not, These Data Security Use Cases Still Apply appeared first on Security Intelligence.

Continue reading Highly Regulated or Not, These Data Security Use Cases Still Apply

What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond

There is a lot of talk about ‘modern’ data security. Organizations want a data security strategy that aligns with a digitally transformative vision. Tech can sometimes drown in buzzwords. What do modernization and vision actually refer to? And what do modern data security solutions really require?  Both terms refer to end-to-end data security for those organizations […]

The post What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond appeared first on Security Intelligence.

Continue reading What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond

KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity

Reading Time: 3 minutes The IT landscape is becoming more complex every day. To manage this complexity, companies need integrated, best-of-breed data protection solutions that secure both structured and unstructured data.

The post KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity appeared first on Security Intelligence.

Continue reading KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity

How Can Companies Move the Needle on Enterprise Cloud Security Risks and Compliance?

Traditional vulnerability assessments don’t always show the full picture of cloud security, compliance and risk. How can enterprises get ahead of the curve?

The post How Can Companies Move the Needle on Enterprise Cloud Security Risks and Compliance? appeared first on Security Intelligence.

Continue reading How Can Companies Move the Needle on Enterprise Cloud Security Risks and Compliance?

Wisdom of the Crowd: How the App Store Model Drives Innovation in Data Security

Application developers can accelerate the pace of innovation in data security by making it easy for third parties to integrate with their platforms.

The post Wisdom of the Crowd: How the App Store Model Drives Innovation in Data Security appeared first on Security Intelligence.

Continue reading Wisdom of the Crowd: How the App Store Model Drives Innovation in Data Security