How to Protect Structured and Unstructured Data

Security Boulevard

Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and structured data contexts.

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

All too many companies lack a full appreciation of how vital it has become to proactively manage and keep secure “unstructured data.”. One reason for the enduring waves of ransomware is that unstructured data is easy for hackers to locate and simple for them to encrypt. Related video: Why it’s high time to protect unstructured data. For a drill down on our conversation about unstructured data exposures please listen to the accompanying podcast.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

McAfee a Leader in The Forrester Wave™ Unstructured Data Security Platforms

McAfee

This introduces new security challenges in being able to locate and control sensitive data across all the potential exfiltration vectors regardless of whether they are in the cloud; on premise via managed or unmanaged machines.

CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack

Malwarebytes

This notice has given every reader an insight into how the attack happened, what CNA did, and what they continue to do for those whose data was affected by this ransomware-attack-slash-data-breach. Data stolen but untouched.

Key steps on the road to LGPD compliance

Thales Cloud Protection & Licensing

Brazil, the largest country in both South America and Latin America, released a data privacy law bringing new business opportunities, especially in the international domain. Visibility across the organization provides the accurate data it needs to make informed decisions.

Avoid these seven sins to stay out of data privacy hell

SC Magazine

The European Union’s GDPR regs have paved the way for companies to focus more on data privacy. Today’s columnist, Rehan Jalil of Securiti, offers insights on how companies can take an organized approach and leverage automation to improve data privacy. Limited data protection.

7 Step Data Loss Prevention Checklist for 2021

CyberSecurity Insiders

Ensure the security of your organization’s sensitive data with this data loss prevention checklist, intended to help mitigate both internal and outsider threats. Create a data inventory. Understand when data is at risk. Featured Data Security How To

How Can You Protect Critical Infrastructure from Ransomware Attacks

Thales Cloud Protection & Licensing

A ransomware is a vicious type of malware that cybercriminals use to block access to business critical systems by encrypting data in files, databases, or entire computer systems, until the victim pays a ransom. Data security.

SentinelOne forks over $155 million for log management company

SC Magazine

Automated endpoint security company SentinelOne has acquired Scalyr, a log management and data analytics platform, for $155 million in equity and cash.

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The Last Watchdog

Sadly, data breaches often occur at this time of year. Related podcast: The need to lock down unstructured data. Every large brand is acutely aware that securing its data is of foremost importance in today’s world, and that by protecting data you are protecting the brand’s equity. The first step toward fortifying one of the company’s most valuable assets — customer or employee data — is to get to know the data better.

Biden’s Executive Order on Cybersecurity calls for MFA and Data Encryption

Thales Cloud Protection & Licensing

Biden’s Executive Order on Cybersecurity calls for MFA and Data Encryption. Multifactor Authentication and Data Encryption. One of the most striking requirements is the implementation of multifactor authentication and data encryption for all Federal governments.

The ambition for a ‘made in Europe’ AI: the Why, the What and the How

IT Security Guru

Building on this body of work, in February 2020 the EC released a ‘White Paper on Artificial Intelligence – A European Approach to Excellence and Trust,’ and two other complementary documents – the ‘European Strategy for Data,’ and ‘A Strategy for Europe Fit for the Digital Age’.

Researcher’s audacious hack demonstrates new type of supply-chain attack

Malwarebytes

DNS data exfiltration is a way to exchange data between two computers without any direct connection, in a way that doesn’t draw much attention. Often the most brilliant ideas are the most simple. The hard part is being the first one to come up with the idea and put it to use.

DNS 74

Why would a lawyer ever need an Information Security Professional?

CyberSecurity Insiders

Regulations from China , South Africa , the European Union’s General Data Protection Regulation ( GDPR ), and India all share the following principles: Consent to collect information. Data obfuscation requirements. Data retention limits. Data portability.

Putting VMware’s Cloud Certification Platform to the Test with Thales’s Vormetric Data Security Manager

Thales Cloud Protection & Licensing

Certifying the full compatibility of the Thales Vormetric Data Security Manager (DSM) with the VMware platform was a critical element in ensuring our mutual customers’ satisfaction. Thales simply needed to deploy the Vormetric Data Security Manager into VMware’s cloud environment, run the VMware KMS Certification Suite and upload the logs from the same platform. Thales configured the Vormetric Data Security Manager and complete certification within a few hours. Data securit

Using Encryption with Access Controls to Mitigate Malware and Ransomware Damage

Thales Cloud Protection & Licensing

Recently the headlines have been dominated by infected enterprise software that has resulted in malware and hackers gaining access to mission critical infrastructures, taking control of systems, and stealing data. FDE works on endpoints because if the device is stolen the data cannot be used.

Can visibility be the key to better privacy?

Thales Cloud Protection & Licensing

Technology innovation creates business value for organizations, but also new challenges for data privacy and protection. Probably also increasing the cost of any resultant data breach, as mentioned in the 2020 IBM Cost of a Data Breach Report. Discover the location of your data.

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

Healthcare’s IT evolution has brought numerous security challenges including regulations, the use of digitally transformative technologies that have created huge amounts of data to store and protect, and the extraordinary value of electronic personal health information (ePHI) to cybercriminals. In this blog post, I’ll discuss how healthcare enterprises can not only meet these challenges, but go beyond compliance to best practice to secure their data and their reputations.

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

In this blog post, I’ll discuss: Our current perimeter defense; The need to shift to a data-centric security approach; and, The need to educate the public to strengthen our critical infrastructure security posture. If we focus primarily on perimeter defense, we will continue to see data breaches and exposure to our critical infrastructure. Perimeter defense, while necessary, is not enough to protect our sensitive data. The Vormetric Data Security Platform.

Data-Centric Security and Big Data

Thales Cloud Protection & Licensing

As Cybersecurity continues to be heavily focused on solving the problem of attacks against software vulnerabilities and system access, one potential silver bullet in the data breach equation remains out of the limelight. Enter data-centric security… a set of technologies that lower the value of data through encryption, tokenization, data masking and access control methods. The Big Data Conundrum. Data security

McAfee MVISION Cloud and Azure Information Protection

McAfee

Definitive Guide to Office 365 Data Protection. Learn how to protect data in Office 365 including common data loss scenarios, threats to users and data including real life examples, Office 365 data protection best practices, etc. 5) Run a scan to look for documents with sensitive data in any cloud application (historical data) and classify the documents with AIP sensitivity labels. What is Azure Information Protection?