To bring strategy back into your security, turn to chess Ramsés GallegoDecember 6, 20210356 views In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways of putting pressure on their opponent. Strategically, they need to see into the future and understand how their moves might open up vulnerabilities that their opponent can exploit later down the line, and make sure they have a plan in place to respond. In short, it’s as much about avoiding unintended outcomes as it is about achieving intended ones – and learning to see the board in this way doesn’t happen overnight. Read more
Getting Started with Data-centric Security Dan SimmonsDecember 6, 20210320 views With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations. Read more
How to Keep Employee Home Wireless Networks from Being Weakest Link your Cybersecurity Chain Yash VartakDecember 6, 20210363 views Now that we are slowly coming out of the COVID-19 Pandemic, work might never return to the “normal” of employees spending the majority of their days in an office building. Remote working, or some hybrid, is probably here to stay, says Forbes Magazine. How much did the Pandemic effect our working habits? Pew Research reported in December of 2020 that roughly 20% worked from home before the coronavirus outbreak and that number quickly ratcheting up to 71% during the outbreak. They also report that 54% would want to work from home after the outbreak ends. Read more
How to Safeguard Your Data & Applications from Ransomware CohesityDecember 6, 20210348 views It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work in or are aware of organizations that have been hit by ransomware over the last few years and had the unenviable responsibility of scrambling to recover data, applications, workloads, and systems in the aftermath of an attack. Read more
GDPR 2021 – Compliance and Penalties; 3 Years Later Steve TcherchianSeptember 21, 20210352 views The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data of EU citizens, regardless of where that business or individual is based. Read more
Making the move to zero trust architecture: 4 key considerations Jeff EntersSeptember 21, 20210296 views New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved wide acceptance in the marketplace, but exactly what it entails has been a subject of debate and even some confusion. Fortunately, we’re moving beyond that now.… Read more
Balancing Agility with Data Security Thomas GloerfeldSeptember 21, 20210305 views Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and functionality to be available in the product on a regular basis. As opposed to the traditional, slower forms of software development, with releases methodically planned and executed over many months or even years, Agile keeps the focus on speed, user feedback, and iterative refinement. Read more
Securing the edge is no longer enough. SPIFFE can protect your infrastructure Phil VachonSeptember 21, 20210444 views Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats... Read more
Take a Data Privacy Road Trip Tobias FuertjesMarch 23, 20210510 views Three years ago, I started as a PreSales consultant covering the topics of Data Analysis and Data Management. These topics were directly connected to the topic of Data Privacy and all the regulations around it, so it was naturally part of my conversations. Read more
‘New Nacha supplementing data security requirements coming up’ Thomas GloerfeldMarch 23, 20210387 views Nacha is a non-profit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through the development of rules, standards, governance, education, advocacy, and in support of innovation, Nacha's efforts benefit the providers and users of those systems. Nacha leads groups focused on API standardization, authors the Quest Operating Rules for EBT, and is the steward of the ACH Network, a payment system that universally connects all U.S. bank accounts and facilitates the movement of money and information. In 2020, nearly 27 billion payments and close to $62 trillion in value moved across the ACH Network. Read more