Data security describes the implementation of policies and procedures to ensure people and things take the right actions with data and information assets, even in the presence of malicious inputs. The right actions mean controlling and enabling data activity by balancing needs from: Stakeholders: Protect personal information while allowing access for legitimate transactions agreed upon […]
A Brief History of Data Security
Data security describes the protection of digital data from a cyberattack or a data breach. A data breach is the unauthorized opening of data, typically to read or copy the information. Stolen data may contain confidential information, such as customer data, credit card numbers, or trade secrets. A cyberattack is much more aggressive. It is […]
How Cybercriminals Use Panic to Defraud and Infect Organizations
Click to learn more about author David Balaban The dreadful coronavirus is taking the world by storm, and humanity is on the threshold of serious changes over the pandemic officially declared on March 11, 2020. Also referred to as COVID-19 or the 2019 Novel Coronavirus (2019-nCoV), this strain is now running rampant across different parts […]
Cloudian Announces Collaborative Solution With Veeam for Hardened Ransomware Protection
A new press release reports, “Cloudian® today announced a new solution based on its HyperStore® object storage and the NEW Veeam Availability Suite v10 that provides ransomware protection within an end-to-end, on-premises backup architecture. The Cloudian-Veeam solution supports S3 Object Lock, enabling customers to make backup data copies immutable and, therefore, invulnerable to hacker encryption […]
Ransomware, Aliens, and Anime: Seriously?
Click to learn more about author David Paquette. In September, a meme that a college student meant as a joke about how to procure government secrets about aliens and UFOs caused serious security concerns for the U.S. Air Force. A Facebook post from 21-year-old Matty Roberts, which said – “Storm Area 51, They Can’t Stop […]
Data Security and a Serious Danger to the IIoT
Click to learn more about author Samuel Bocetta. For as long as there have been computer networks, there has been an ongoing arms race between those striving to keep them private and secure, and those who seek to exploit their weaknesses and use, steal, or leverage their contents for fun or profit. This Spy vs. […]
Keeping Your Critical Data Secure
Click to learn more about author Mat Hamlin. 13,443,149,623 and counting – that’s the number of data records that have been lost or stolen since 2013. We are living in a world where a new cybersecurity breach happens every day, attack vectors such as ransomware and malware only continue to become more sophisticated and internal […]
Ransomware’s Menace Goes Far Beyond Encryption
Click to learn more about author Linus Chang. It would be difficult these days to be unaware of the havoc ransomware can wreak. But most people’s image of “as bad as it gets” from this malicious form of malware is having your data encrypted and your money extorted in hopes that you’ll buy access to […]
FireEye Brings Advanced Machine Learning to Endpoint Security With MalwareGuard
A new press release states, “FireEye, Inc., the intelligence-led security company, today announced the addition of MalwareGuard™ – a new advanced machine learning based detection and prevention engine – to its Endpoint Security solution. MalwareGuard is designed to help detect and block cyber-threats including never-before-seen threats to provide customers an added level of protection to […]
How to Protect your Enterprise Data Against Social Engineering Attacks
Click to learn more about author Ilan Paretsky. If someone had predicted, a decade or two ago, that knowledge of psychology and human behavior would one day be a key factor in protecting IT systems from cyber criminals, it would have seemed far-fetched. However, it’s very much the reality facing security professionals in 2018. Modern cyber […]