article thumbnail

RSAC insights: Concentric AI directs Google’s search techniques towards locking down data sprawl

The Last Watchdog

In order to extract value from the Internet, data sprawl first must get reined in. Solving data sprawl has now become a focal point of cybersecurity. Today sensitive information, especially unstructured data , routinely gets dispersed across multiple cloud-connected platforms. This has always been the case.

article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

Digital content creation is flourishing with intellectual property, financial records, marketing plans and legal documents circulating within a deeply interconnected digital ecosystem. The trend that we’re seeing is that more than 30 percent of the content flowing into data lakes is from untrusted sources,” he says. “It’s

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Can You Protect Critical Infrastructure from Ransomware Attacks

Thales Cloud Protection & Licensing

The second ransom payment to get cybercriminals to hand over the decryption key, for the victim to gain back access to their data. Do not publish unprotected RDP access points on the internet. Data security. Krishna Ksheerabdhi | VP, Product Marketing. This is a form of double extortion. Why does Ransomware Matter?

article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

In an effort to meet compliance requirements – and with an eye towards cutting costs – the healthcare industry has turned its attention towards embracing digitally transformative technologies, including cloud, big data, Internet of Things and containers. respondents reported using these technologies with sensitive data.