Remove Cybersecurity Remove Encryption Remove Unstructured Data
article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

. “Cell C is aware that data compromised in the recent cybersecurity incident has been unlawfully disclosed by RansomHouse, the threat actor claiming responsibility.” “This follows a previously reported incident involving unauthorised access to unstructured data in some parts of our IT environment.”

article thumbnail

Best Encryption Software for 2022

eSecurity Planet

It’s been a couple of decades since data tapes delivered by trucks made encryption a standard enterprise cybersecurity practice. Yet even as technology has changed, sending and receiving data remains a major vulnerability, ensuring encryption’s place as a foundational security practice.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thales Named Overall Leader in KuppingerCole’s Leadership Compass Data Security Platforms

Thales Cloud Protection & Licensing

The KuppingerCole report takes an in-depth look at the evolving data security market, highlighting the solutions that have proved most successful in adapting to todays shifting cybersecurity challenges. The Thales approach spans three main areas: protection, monitoring, and compliance.

article thumbnail

Thales Named Overall Leader in KuppingerCole’s Leadership Compass Data Security Platforms

Security Boulevard

The KuppingerCole report takes an in-depth look at the evolving data security market, highlighting the solutions that have proved most successful in adapting to todays shifting cybersecurity challenges. The Thales approach spans three main areas: protection, monitoring, and compliance.

article thumbnail

RSAC insights: Concentric AI directs Google’s search techniques towards locking down data sprawl

The Last Watchdog

Solving data sprawl has now become a focal point of cybersecurity. Much of the buzz as RSA Conference 2022 gets underway next week in San Francisco will be around innovations to help companies make sense of data as it gets increasingly dispersed to far-flung pockets of the public cloud. Data is the foundational element.

article thumbnail

eSecurity Planet’s 2022 Cybersecurity Product Awards

eSecurity Planet

The editors of eSecurity Planet have been giving advice to enterprise security buyers for more than a decade, and for the last five years we’ve been rating the top enterprise cybersecurity products, compiling roughly 50 lists to date on every product imaginable, from networks to endpoints and out to the cloud and beyond.

article thumbnail

Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working

Security Boulevard

From an operational perspective, this will make for a happier and more productive workforce, but it does throw up some additional cybersecurity challenges. There are many things to consider for cybersecurity teams when protecting a hybrid working environment, but these are our top five: . The nature of hybrid working. Featured: .