Advertisement

What Is Data Security?

Data security describes the implementation of policies and procedures to ensure people and things take the right actions with data and information assets, even in the presence of malicious inputs. The right actions mean controlling and enabling data activity by balancing needs from: Stakeholders: Protect personal information while allowing access for legitimate transactions agreed upon […]

A Brief History of Data Security

Data security describes the protection of digital data from a cyberattack or a data breach. A data breach is the unauthorized opening of data, typically to read or copy the information. Stolen data may contain confidential information, such as customer data, credit card numbers, or trade secrets. A cyberattack is much more aggressive. It is […]

Cloudian Announces Collaborative Solution With Veeam for Hardened Ransomware Protection

A new press release reports, “Cloudian® today announced a new solution based on its HyperStore® object storage and the NEW Veeam Availability Suite v10 that provides ransomware protection within an end-to-end, on-premises backup architecture. The Cloudian-Veeam solution supports S3 Object Lock, enabling customers to make backup data copies immutable and, therefore, invulnerable to hacker encryption […]

Keeping Your Critical Data Secure

Click to learn more about author Mat Hamlin. 13,443,149,623 and counting – that’s the number of data records that have been lost or stolen since 2013. We are living in a world where a new cybersecurity breach happens every day, attack vectors such as ransomware and malware only continue to become more sophisticated and internal […]

FireEye Brings Advanced Machine Learning to Endpoint Security With MalwareGuard

A new press release states, “FireEye, Inc., the intelligence-led security company, today announced the addition of MalwareGuard™ – a new advanced machine learning based detection and prevention engine – to its Endpoint Security solution. MalwareGuard is designed to help detect and block cyber-threats including never-before-seen threats to provide customers an added level of protection to […]