Tool sprawl is a symptom, and complexity is cybersecurity’s chronic illness. Ashok Sankar of ReliaQuest shares ways to manage this complexity and help organizations rethink how they deploy and measure their cybersecurity defenses.
Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking...
Traditionally, data management has not received the attention it deserves. But with the advent of Kubernetes and cloud-native technologies, this conversation becomes a game-changer. Michael Cade of Kasten by Veeam explains why, how and where to take advantage.
Economic turmoil, triggered by the global spread of COVID-19, is increasing and accelerating opportunistic, premeditated and organized insurance fraud. Criminals who invent claims will spend time to discern how to best exploit the weaknesses of an insurer’s fraud defenses. Customers and agents are learning how to...
Pharmaceutical companies can leverage data analytics, predictive analytics and artificial intelligence to fight drug diversion fraud, says Charles Washington, senior director, global fraud and asset protection, at Pfizer.
A centralized log strategy has become an essential component in the administration of today’s complex IT environments.
Since log management data is central to the analysis of securing IT enterprise services, understanding operational
performance of IT infrastructure and applications, and key to meeting data...
It is essential that government organizations and the private sector bodies in their supply chain have the
right solutions in place to minimize the risk of data loss in the public sector. Systems for data classification
and data loss prevention allow organizations to effectively control and manage data and ensure...
Whatever happens in 2021 from an economic, health and business perspective, managing risk in the supply chain is going to be a
top priority. Where organizations have large supplier ecosystems the potential for cyber-attacks and data breach risks increases.
To combat this, organizations must gain visibility and...
The threat of unwanted sensitive data acquisition is a ticking time bomb for data breaches in the future. In a
world of digital collaboration and increasing legislation, the
adage ‘ignorance is bliss’ won’t help, especially when it comes
to data protection.
This paper explores the risks of sensitive
Global Data Visionaries are making waves in the digital world. They are championing privacy-led approaches to data usage, which enable organizations to realize the full value of their data, bespoke to their contextual needs.
These ‘Data Visionaries’ comprise of individuals who have disrupted industries or...
Adam Turteltaub, chief engagement and strategy officer at the Society of Corporate Compliance and Ethics, says compliance teams should create a dashboard of data that will help keep track of actions taken by staff members who are working remotely.
An evolving workplace, greater reliance on IoT and the cloud, and already we have seen the new face of supply chain attacks. This is the backdrop for 2021, and Imperva's Brian Anderson offers insights into the cyber-attack outlook.