Third-party access: The overlooked risk to your data protection plan

A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping […]

The post Third-party access: The overlooked risk to your data protection plan appeared first on Security Intelligence.

Continue reading Third-party access: The overlooked risk to your data protection plan

The compelling need for cloud-native data protection

Cloud environments were frequent targets for cyber attackers in 2023. Eighty-two percent of breaches that involved data stored in the cloud were in public, private or multi-cloud environments. Attackers gained the most access to multi-cloud environments, with 39% of breaches spanning multi-cloud environments because of the more complicated security issues. The cost of these cloud […]

The post The compelling need for cloud-native data protection appeared first on Security Intelligence.

Continue reading The compelling need for cloud-native data protection

Understanding Saudi Arabia’s personal data protection law

You may be familiar with data protection laws like HIPAA, GDPR and CCPA. But did you know that other foreign countries are also introducing comprehensive regulations? To address escalating data protection challenges, the Personal Data Protection Law (PDPL) was implemented in Saudi Arabia in September 2021. The law was later modified in March 2023, signifying […]

The post Understanding Saudi Arabia’s personal data protection law appeared first on Security Intelligence.

Continue reading Understanding Saudi Arabia’s personal data protection law

The Forrester Consulting TEI of Guardium Data Protection study: 5 data security lessons

Practicality and simplicity: That’s what data security analysts want most from their data protection tools. That’s the essence we gleaned from the Forrester Consulting Total Economic Impact (TEI) study commissioned by IBM for its IBM Security Guardium Data Protection product. The TEI study focuses specifically on Guardium Data Protection, but its interviews with security professionals […]

The post The Forrester Consulting TEI of Guardium Data Protection study: 5 data security lessons appeared first on Security Intelligence.

Continue reading The Forrester Consulting TEI of Guardium Data Protection study: 5 data security lessons

IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

KuppingerCole named IBM Security Guardium as an overall leader in their Leadership Compass on Data Security Platforms. IBM was ranked as a leader in all three major categories: Product, Innovation, and Market. With this in mind, let’s examine how KuppingerCole measures today’s solutions and why it’s important for you to have a data security platform that you […]

The post IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market appeared first on Security Intelligence.

Continue reading IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for […]

The post Transitioning to Quantum-Safe Encryption appeared first on Security Intelligence.

Continue reading Transitioning to Quantum-Safe Encryption

Modern Data Security Needs a Modern Solution

The role of a data security analyst isn’t an easy one. It has always been hard to address data security because of the volume, speed and variety of data in the IT landscape. However, over the last few years, the job of a data security analyst, focused on protecting sensitive or regulated data, has become […]

The post Modern Data Security Needs a Modern Solution appeared first on Security Intelligence.

Continue reading Modern Data Security Needs a Modern Solution