Are you confident that your business critical data is protected? According to the recent market research Global Data Protection Index conducted by Vanson Bourne, the volume of data being managed is growing at a phenomenal rate from 1.53PB in 2016 to 9.47PB in 2018 in EMEA - but organizations are struggling with...
Purpose-built backup appliances (PBBAs) have been foundational
components to many organizations' backup/recovery infrastructure for
more than a decade. The importance of PBBAs is illustrated in the
numbers: According to IDC, in 2018, the data replication and protection
(DR&P) market was approximately $8.9 billion,...
The data era is changing how organizations think about, monetize and protect data. The volume of data being managed is growing at a phenomenal rate from 1.45PB in 2016 to 9.70PB in 2018. Data loss costs nearly 2x more than unplanned systems downtime. However, some organizations are better equipped than others to...
As organizations plot their 2020 cybersecurity strategies, especially in light of privacy regulations, key data governance challenges are emerging. What are the critical issues, and how are they being addressed?
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers, and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously...
A poor customer experience and insufficient security in the account opening process has been shown to directly and negatively impact long-term customer loyalty, retention and profitability. So, how do you provide a better and more secure customer experience in the digital account opening process?
More than 100...
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.
Increasingly complex and sophisticated cyber-attacks are evading
traditional defenses, forcing firms to seek solutions beyond traditional
threat blocking and prevention mechanisms. Threat actors have had
success with phishing, zero-day malware/exploits, and fileless attacks and
are now cashing in on ransomware and...
For modern organizations, cyberattacks are
simply unavoidable. There is no hiding from
this fact. And if attacks are unavoidable,
then the key to effective protection is
speed and accuracy.
Organizations may believe in the critical importance of
speed but be unsure of how that translates into metrics.
Ransomware brings a business to a screeching halt every 11 seconds, making it the most pervasive and destructive malware threat out there.
Savvy businesses know that it's not about whether a ransomware attack will occur, but when. With fast-evolving ransomware strains, protecting your business means it is...
Facebook scientists have proposed using "radioactive data" watermarks to identify when online images get used to train neural networks. The proposal appears to be aimed at the rise of big data startups, such as Clearview AI, that are scraping publicly available photographs to create facial recognition tools.
As a security leaders, too often you are brought to the table after a digital transformation project has been initiated, so you are forced to take a reactive position. But Adam Bosnian of CyberArk sees an important, proactive role for security. And a good start is by ensuring privileged access management is a key...