Resources

MARKETING FIRM EXACTIS LEAKED A PERSONAL INFO DATABASE WITH 340 MILLION RECORDS

Read More »

AI/ML seen as important as staff as businesses evaluate their still-lagging security response

Read More »

Research house Gartner has predicted that worldwide security spend will reach $96.3bn in 2018, an increase of 8% from 2017.

Gartner stated that organisations now spend more on security measures as a result of regulations, shifting buyer mind set, awareness or emerging threats and the evolution of digital business strategies.

Read More »

Automated data classification enables utilizing “hybrid” cloud model

Yaniv Avidan December 12, 2017 Hybrid cloud models are designed to allow institutions to simultaneously store and process certain data in the cloud, while a portion of the processing or storage is done locally on premise. For example, the application may reside in the cloud, but the customer data is stored locally. This may make […]

Read More »

End point is dead, long live Data – the new end point.

Data has traditionally been seen as the passive result of transactional systems, to be surrounded, protected, and secured in systems that take an active part in the overall security perimeter of an enterprise. As that perimeter decomposes and becomes more fluid (e.g., cloud, mobile, IoT), data must be elevated so that each data object can […]

Read More »

60 Cybersecurity Predictions For 2018

60 Cybersecurity Predictions For 2018

Read More »

GDPR data protection: the data subject, personal data and identifiers explained

GDPR data protection: the data subject, personal data and identifiers explained

Read More »

Data Segregation and Access Control powered by AI

The network perimeter crumble, challenges the traditional “hard exterior, soft interior” network security model. MinerEye leverages AI to handle Data Segregation across platforms without the capital expense or disruptions to operations. It enables enterprises to identify and segregate data for various user groups within their infrastructures to ensure and data is accessible only to those […]

Read More »

Data Segregation: Missing Piece in Securing Enterprise Content

This is how customers describe Data Segregation problem to me. “We have millions of documents sitting in enterprise application servers that we know are accessible to all our users. We are subject to regulations that require us to identify classified documents within these large sets of data, and segregate them into restricted locations. It is […]

Read More »

New article reveals the necessity of information governance and data classification for complying with the new data protection policy, the EU GDPR

Approaching the new General Data Protection Regulation (GDPR), effective from May 2018, companies based in Europe or having personal data of people residing in Europe, are struggling to find their most valuable assets in the organization – their sensitive data. The new regulation requires organizations to prevent any data breach of personally identifiable information (PII) […]

Read More »

Data – centric Security: A New Information Security Perimeter.

Data – Centric Security: A New Information Security Perimeter.

Read More »

Data protection tools become shelfware.

Data protection tools become shelfware.

Read More »

Legacy data protection solutions are going to be hit by this.

Legacy data protection solutions are going to be hit by this.

Read More »

Legacy data protection solutions are going to be hit by this.

Legacy data protection solutions are going to be hit by this.

Read More »

65% of respondents say not knowing the location of sensitive or confidential data.

65% of respondents say not knowing the location of sensitive or confidential data.

Read More »

Hybrid AI takes on cyber security – Cyber security analysts: Software versus mammal

Hybrid AI takes on cyber security – Cyber security analysts: Software versus mammal

Read More »

Hasso Plattner Ventures Leads $15M Strategic Investment in Vera

Hasso Plattner Ventures Leads $15M Strategic Investment in Vera

Read More »

We Now Have an Instruction Manual for Data Security Programs

We Now Have an Instruction Manual for Data Security Programs

Read More »

Bad Data Costs the U.S. $3 Trillion Per Year

Bad Data Costs the U.S. $3 Trillion Per Year

Read More »

A better way to segregate data by classification level

A better way to segregate data by classification level

Read More »

Government aligns data laws with GDPR

Government aligns data laws with GDPR

Read More »

The Equifax Data Breach: What to Do

The Equifax Data Breach: What to Do

Read More »