Zero Trust: Bringing Privileged Access and Data Security Analytics Together

Who owns the data in your organization? If you’re like many, there’s a chance it’s fragmented. Maybe legal owns governance while security owns data security. IT, legal, security and line-of-business owners might share tasks. Perhaps there is no real data governance or oversight at all. What we hear from people across all industries, though, is that […]

The post Zero Trust: Bringing Privileged Access and Data Security Analytics Together appeared first on Security Intelligence.

Continue reading Zero Trust: Bringing Privileged Access and Data Security Analytics Together

Highly Regulated or Not, These Data Security Use Cases Still Apply

In light of recent news-making breaches, we can see there really is no industry immune from data breaches. While I do not want to be doom-and-gloom, manufacturing, consulting, entertainment, retail, consumer goods, hospitality, transportation – these sectors together make up 47% of all data breaches. In fact, consulting and other services made up 14% of […]

The post Highly Regulated or Not, These Data Security Use Cases Still Apply appeared first on Security Intelligence.

Continue reading Highly Regulated or Not, These Data Security Use Cases Still Apply

IBM Security Guardium Named Industry Leader for Third Consecutive Time

KuppingerCole named IBM Security Guardium an overall business leader in their Leadership Compass on Database and Big Data Security Solutions. IBM was also again ranked as a leader in all three sections: product, innovation and market. With this in mind, take a look at how KuppingerCole measures today’s solutions and why good data security is so important. […]

The post IBM Security Guardium Named Industry Leader for Third Consecutive Time appeared first on Security Intelligence.

Continue reading IBM Security Guardium Named Industry Leader for Third Consecutive Time

Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

Let’s say I tell you that my daughter crawled today. However, you don’t know if my daughter is an infant or 30 years old. If you ask, and I tell you my daughter is an infant, you still don’t know if she’s already been crawling or today marks the first time. If this is the […]

The post Turning Down the Noise: Adding Context to the SIEM With Modern Data Security appeared first on Security Intelligence.

Continue reading Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

How Vulnerability Management Can Stop a Data Breach

Vulnerability management may not be the sexiest topic. But, while buzzier topics are certainly important, vulnerability management may just be the key to an effective data security strategy. According to a Ponemon Institute report, 42% of nearly 2,000 surveyed IT and security workers indicated that they had suffered a data breach in the last two […]

The post How Vulnerability Management Can Stop a Data Breach appeared first on Security Intelligence.

Continue reading How Vulnerability Management Can Stop a Data Breach

What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond

There is a lot of talk about ‘modern’ data security. Organizations want a data security strategy that aligns with a digitally transformative vision. Tech can sometimes drown in buzzwords. What do modernization and vision actually refer to? And what do modern data security solutions really require?  Both terms refer to end-to-end data security for those organizations […]

The post What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond appeared first on Security Intelligence.

Continue reading What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond

KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity

Reading Time: 3 minutes The IT landscape is becoming more complex every day. To manage this complexity, companies need integrated, best-of-breed data protection solutions that secure both structured and unstructured data.

The post KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity appeared first on Security Intelligence.

Continue reading KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity

Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.

The post Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness appeared first on Security Intelligence.

Continue reading Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

Wisdom of the Crowd: How the App Store Model Drives Innovation in Data Security

Application developers can accelerate the pace of innovation in data security by making it easy for third parties to integrate with their platforms.

The post Wisdom of the Crowd: How the App Store Model Drives Innovation in Data Security appeared first on Security Intelligence.

Continue reading Wisdom of the Crowd: How the App Store Model Drives Innovation in Data Security

How Will You Solve the Data Classification Conundrum?

Data classification takes on even greater importance today in the context of regulatory compliance mandates and debates over data privacy. Here’s what you need to know.

The post How Will You Solve the Data Classification Conundrum? appeared first on Security Intelligence.

Continue reading How Will You Solve the Data Classification Conundrum?