Maximizing data privacy: Making sensitive data secure by default

CTOvision

Read Ayal Yogev explain how companies can maximize data security by making sensitive data secure by default on Help Net Security : Consider the case of contact tracing, which has […].

.Net 265

Stay vigilant against these 5 data security risks

CTOvision

Read Jessica Hubbard list five data security risks for the finance sector companies on Financial Management : With corporate data breaches making news headlines almost every other day, it is […].

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

6 Steps to Securing Production File Data in the Cloud

CTOvision

Read Russ Kennedy list six ways in which you can secure production file data in the cloud on Security Boulevard : Unstructured file data is the fastest-growing segment of enterprise […].

Data Security and Third-Party IT Asset Disposition: A Paradox

CTOvision

Read Heidi Parthena White write about the data security and third-party asset disposition paradox on Infosec Magazine: Data security is a hot topic these days, and for good reason. In […].

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

EnVeil: Pioneering data security company protecting data in use

CTOvision

Enveil is a pioneering data security company protecting data in use. metro area, Enveil is a data security company that focuses on protecting Data in Use. Company Encryption Security CompaniesIt is one of the DataTribe portfolio of companies. Here is a brief overview by Enveil CEO Ellison Anne Williams: Based in the Washington, D.C. In the words of […].

Keeper Security raises $60 million to protect companies from data breaches

Venture Beast

Keeper Security, a startup developing encryption and data breach prevention solutions for businesses, has secured $60 million in venture capital.

Data-Centric Security and Zero Trust Architecture:

CTOvision

It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. Cyber Security Disruptive IT information technology National securityThe time had come, he announced, to abandon the idea of unbreakable network perimeters, and to deal with the reality that intruders will inevitably find their way into protected networks. In the […].

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

The Latest Developments In Corporate Data Security

CTOvision

The Latest Developments In Corporate Data Security Corporate data security is defined as the processes by which sensitive information is accessed only by authorized individuals and then destroyed when it is no longer needed. Proactive measures, including software purchases, third-party services, and internal company policies, offer data security solutions that would prevent most types of […]. Big Data Cloud Computing CTO Cyber Security

BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 311

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

Big Data Cyber Security Architect Eddie Garcia Discusses Best Practices at 27 Jan Breakfast in DC

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

Machine Learning Is Transforming Data Security

Eric D. Brown

Data is the lifeblood of any organization today so it should be easy to understand that security of that data is just as important (if not more important) that the data itself.

Keeping Data Secure in the Always-On World

CTOvision

Read why Michael Cade says that it is important to keep your data secure in the 24/7 world on Infosec Magazine : The nature of the modern business is to keep systems ‘always-on.’

More reasons to put secure data in the public cloud

David Linthicum

This should surprise no one, considering the amount of core business assets that are being pushed to the cloud now, as well as the amount that security providers are spending on cloud. What’s the risk in leaving the data where it is, versus moving it to a public cloud?

Altr raises $15 million to broaden data-security-as-a-service

Venture Beast

Altr has raised $15 million to broaden its business of providing data-security-as-a-service in the era of cloud technology. Read More.

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility.

GreenTec: Persistent Data Protection With Storage Level Security

CTOvision

GreenTec-USA is a pioneer in data center modularization and optimization for servers, storage, video and secure document storage. The premise behind their cyber security solutions is one that leaders in the cyber business know well – breaches are not a question of if, but when. […]. Security Companies Computer security custom firmware data Data Protection Security storage level security Storage solutions technology

Join World Renowned Big Data Cyber Security Architect Eddie Garcia at 27 Jan Breakfast

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

Set Up a Budget-Friendly Application Security Program

CEB IT

In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 This was only one of the many instances that left data exposed and caused vulnerabilities in 2020. Security

Budget 224

How to secure customer data for SaaS success

CTOvision

Johnson explain how SaaS companies can secure customer data on Help Net Security : Recently, some of the biggest names in SaaS have experienced customer support data breaches. With data playing an important role in the success of customer support, companies must ensure information security is top of mind to build relationships […]. Read Robert C.

.Net 184

How Big Data Keeps Businesses Secure

CTOvision

Read Magnolia Potter explain how big data can be used to keep your business secure on Inside Big Data Big data has become almost ubiquitous in the world of business. From supply chain and inventory management to HR processes like hiring, big data has proven itself to be a valuable tool. However, big data can […].

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets.

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Experian’s Data Breach Preparedness Study: Increased Investments in Security Aren’t Stopping Breaches

CTOvision

While corporations today are more knowledgeable about security threats and prepared to respond to data breaches, there are key areas in which progress declined in 2019. Experian® released its seventh annual corporate preparedness study, Is Your Company Ready for a Big Data Breach?,

Study 254

What Financial Services Executives Need To Know About Data Security

CTOvision

Read why financial services executives need to know about data security on Forbes : The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the most-breached sector. Cyber Security NewsIt’s easy to understand why. The industry is known for its wide array of interconnected systems and the processing of millions of […].

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

On Tuesday, January 27, 2015 CTOvision publisher and Cognitio Corp co-founder Bob Gourley hosted an event for federal big data professionals. The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia.

Fugue: Autonomous Cloud Security and Compliance

CTOvision

Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Elevate Security: A data-driven and personalized approach to security changes behaviors and helps you measure and communicate efficacy of your programs

CTOvision

With this post we are initiating coverage of Elevate Security in our Disruptive IT Directory as a Security Company in our Security Training category. Company Governance, Training, Education, Process Security Companies Elevate

Enterprise digital transformation leaves data security behind

CTOvision

Read why Charlie Osborne says that implementing modern systems could have a sinister cybersecurity side-effect for enterprises on ZDNet : The rush to embrace new technologies in the name of business modernization, supply chain efficiency, visibility, and cost savings is leading to an increased risk of data compromise, researchers claim. The 2019 Thales Data Threat Report, […].

Data security: 5 problems and solutions

Tech Republic Security

When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report

Report 161

Autonomous IT: Less Reacting, More Securing

CTOvision

Read Greg Jensen explains what autonomous IT is on Dark Reading : Artificial intelligence (AI) is a game changer in fighting cybercrime and defending data, and it can be decisive […].

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers

CTOvision

Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. CTO Cyber Security Infrastructure Companies News Security Companies SolarflareResearch Team.

Are Your New Remote Workers Visible to Security Operations?

CEB IT

While this move creates obvious challenges for IT in terms of infrastructure and capacity, it’s also creating challenges for security teams as they push to scale remote work on a rapid and global level. Lack of visibility does not equate to a lack of security vulnerabilities.

Cape Privacy launches security-conscious collaboration platform for data science

Venture Beast

Cape Privacy, a startup based in New York, is developing a security-conscious collaboration platform for AI and data science work. Read More.

A Secure Vault System for Internet of Things Devices

CTOvision

The Growing Importance Of Cyber Security Skills

CTOvision

As data breaches have become the order of the day, Adi Gaskell explains the growing importance of having cyber security talent in your company on Forbes : Cybercrime costs the UK several billion pounds per year. CTO Cyber Security News Training and EducationIndeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last […].

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. Skyhigh was built to enable enterprises to control there data, even if you do not own your own […].

Security and disaster recovery are priorities when choosing data center provider

Tech Republic Data Center

Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 7: Dark data discovery.