Resources

KuppingerCole Report Executive View – MinerEye Data Tracker

11.22.18

79063 Executive View MinerEye Data Tracker

Read More »

IDENTIFIZIEREN & VERFOLGEN VON SENSIBLEN DATEN NACH IHREM KERN

11.22.18

MinerEye – IDENTIFIZIEREN VERFOLGEN VON SENSIBLEN DATEN NACH IHREM KERN

Read More »

Your Go To for information on data protection laws per country

10.17.18

DLA Piper Data Protection Laws of the World compares data protection laws around the world. The information includes variables such as legislation, local authorities, registration and requirements. You can also directly compare two countries.

Read More »

Why has data classification become so popular recently?

09.01.18

A year ago, data classification was of minimal importance. No Twitter hashtags, no research coverage, hardly any mentions in the media. Fast forward to now and it seems as if everyone is talking and writing about the topic. And for good reason. Gartner recently released its prestigious Hype Cycle reports for 2018. In seven reports […]

Read More »

MARKETING FIRM EXACTIS LEAKED A PERSONAL INFO DATABASE WITH 340 MILLION RECORDS

06.28.18

Read More »

AI/ML seen as important as staff as businesses evaluate their still-lagging security response

05.01.18

Read More »

Research house Gartner has predicted that worldwide security spend will reach $96.3bn in 2018, an increase of 8% from 2017.

12.27.17

Gartner stated that organisations now spend more on security measures as a result of regulations, shifting buyer mind set, awareness or emerging threats and the evolution of digital business strategies.

Read More »

Automated data classification enables utilizing “hybrid” cloud model

12.26.17

Yaniv Avidan December 12, 2017 Hybrid cloud models are designed to allow institutions to simultaneously store and process certain data in the cloud, while a portion of the processing or storage is done locally on premise. For example, the application may reside in the cloud, but the customer data is stored locally. This may make […]

Read More »

End point is dead, long live Data – the new end point.

12.06.17

Data has traditionally been seen as the passive result of transactional systems, to be surrounded, protected, and secured in systems that take an active part in the overall security perimeter of an enterprise. As that perimeter decomposes and becomes more fluid (e.g., cloud, mobile, IoT), data must be elevated so that each data object can […]

Read More »

60 Cybersecurity Predictions For 2018

11.28.17

60 Cybersecurity Predictions For 2018

Read More »

GDPR data protection: the data subject, personal data and identifiers explained

11.27.17

GDPR data protection: the data subject, personal data and identifiers explained

Read More »

Data Segregation and Access Control powered by AI

11.26.17

The network perimeter crumble, challenges the traditional “hard exterior, soft interior” network security model. MinerEye leverages AI to handle Data Segregation across platforms without the capital expense or disruptions to operations. It enables enterprises to identify and segregate data for various user groups within their infrastructures to ensure and data is accessible only to those […]

Read More »

Data Segregation: Missing Piece in Securing Enterprise Content

11.25.17

This is how customers describe Data Segregation problem to me. “We have millions of documents sitting in enterprise application servers that we know are accessible to all our users. We are subject to regulations that require us to identify classified documents within these large sets of data, and segregate them into restricted locations. It is […]

Read More »

New article reveals the necessity of information governance and data classification for complying with the new data protection policy, the EU GDPR

11.25.17

Approaching the new General Data Protection Regulation (GDPR), effective from May 2018, companies based in Europe or having personal data of people residing in Europe, are struggling to find their most valuable assets in the organization – their sensitive data. The new regulation requires organizations to prevent any data breach of personally identifiable information (PII) […]

Read More »

Data – centric Security: A New Information Security Perimeter.

11.22.17

Data – Centric Security: A New Information Security Perimeter.

Read More »

Data protection tools become shelfware.

11.22.17

Data protection tools become shelfware.

Read More »

Legacy data protection solutions are going to be hit by this.

11.22.17

Legacy data protection solutions are going to be hit by this.

Read More »

Legacy data protection solutions are going to be hit by this.

11.22.17

Legacy data protection solutions are going to be hit by this.

Read More »

65% of respondents say not knowing the location of sensitive or confidential data.

11.22.17

65% of respondents say not knowing the location of sensitive or confidential data.

Read More »

Hybrid AI takes on cyber security – Cyber security analysts: Software versus mammal

11.22.17

Hybrid AI takes on cyber security – Cyber security analysts: Software versus mammal

Read More »

Hasso Plattner Ventures Leads $15M Strategic Investment in Vera

11.22.17

Hasso Plattner Ventures Leads $15M Strategic Investment in Vera

Read More »

We Now Have an Instruction Manual for Data Security Programs

11.22.17

We Now Have an Instruction Manual for Data Security Programs

Read More »

Bad Data Costs the U.S. $3 Trillion Per Year

11.22.17

Bad Data Costs the U.S. $3 Trillion Per Year

Read More »

A better way to segregate data by classification level

11.22.17

A better way to segregate data by classification level

Read More »

Government aligns data laws with GDPR

11.22.17

Government aligns data laws with GDPR

Read More »

The Equifax Data Breach: What to Do

11.22.17

The Equifax Data Breach: What to Do

Read More »