Tag : Cybersecurity

https://insights.comforte.com/hubfs/Businessman%20touching%20futuristic%20lock%20and%20circuit%20board%20interface%20in%20data%20center.jpeg
Articles C2 Fall 2022

Why it’s Time to Get Proactive About Security

Thomas Gloerfeld
Of all the business risks facing organizations today, cyber-attacks were recently highlighted by executives as the most serious. That’s a heartening sign that awareness levels at the very top are at least improving. But it’s too soon...
Articles C2 Fall 2022

The Insider Threat Problem: Your biggest threat may already be inside!

Nik Earnest
With insider threats it’s not a matter of if, but rather a question of when your organization will be hit. Just last week HackerOne, a security company, dealt with a rogue employee stealing data reported...
Articles C2 Fall 2022

The Struggle with Threat Intelligence

Kevin Swan
Driven by a vast majority of security professionals who consider cyber threat intelligence a valuable resource in finding and dealing with security threats, the adoption of threat intelligence services and capabilities continues to take off....
Articles C2 Fall 2022

Are we on the path to a National Data Privacy Law?

Stan Wisseman
For years, US lawmakers have avoided making tough calls about what data privacy protections we should give consumers and how they should be enforced. That finally may be changing. Last week, the US House Energy...
Articles C2 Summer 2022

Managing Unstructured Data with Cohesity SmartFiles on HPE

Cohesity
The explosion of unstructured data growth has tasked organizations with not only managing and storing application data but also with gaining insights from that data while keeping costs under control. This is no simple task....
Articles C2 Summer 2022

XYPRO Presents Zero-Trust Security, Enterprise Integration, at HPE India’s BCD

Steve Tcherchian
It was an honor to be invited to speak at this year's Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days....
Articles C2 Spring 2022 Data Solutions Data Solutions Ransomware Security

Continuous Data Protection: The new imperative

Ziv Kedem
Recent world events have heightened concerns about data security. Stricter laws and increased risk of cyber attacks have forced businesses to prioritize data protection measures and implement them quickly....
https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg
Articles C2 Winter 2021 Data Data Security

Getting Started with Data-centric Security

Dan Simmons
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
Articles C2 Winter 2021 Data

To bring strategy back into your security, turn to chess

Ramsés Gallego
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways...
Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......