A data security platform can provide a holistic approach by providing key data-centric capabilities that keep data secure from first touch—during data acquisition—through the activities such as data curation and analysis and ultimately to archiving and data destruction.
The Biden cybersecurity executive order maps out how the U.S. government will implement cybersecurity requirements and standards – but it is just the beginning. The federal government won’t be the last entity demanding more security transparency from software vendors and this is likely a sign of what’s to come for any organization creating software in any industry.
Privacy and security become further inextricably linked as consumers’ expectations rise. With this understanding, how should businesses organize to fulfill the privacy and security promises that today’s customers expect? Dell's Chief Security Officer, John Scimone, believes that a converged operational model is the most effective and efficient approach for the majority of organizations to achieve these outcomes.
Threat intelligence is only one piece of the puzzle when it comes to improving supply chain security. As part of protecting the supply chain and reducing third-party risk, here's how your organization should get started.
Fact is, security in the cloud needs improvement. The problem is that cloud service providers treat cloud security as a shared responsibility with their customers. And while cloud purveyors typically hold up their end of the bargain, many customers do not. Human error among cloud customers is rampant.
The insider threat is not a new risk for security teams. And, in the wake of COVID-19 and the newly remote workforce, there has never been a greater need for organizations to better balance their efforts to defend against both external and internal threats.
Mira LaCous, Chief Technology Officer of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security.
Good security hygiene practices go a long way to mitigating risk day in and day out. But security teams also need the flexibility to reorient themselves, so that when new threats emerge or new best practices or technologies become available, they can adapt.
Is your data truly safe when you move to the cloud? The recent fire at the OVHcloud’s data center in France proves that it is not. Here are four ways to keep your data safe, even when disaster strikes your cloud provider.
John Parlee, Chief Information Security Officer (CISO) at Park Place Technologies, talks to Security magazine about key trends in the network security space, including why analytics are critical to network security and how companies can ensure they have a viable monitoring solution.