Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware,…
Browsing Categoryregulatory compliance
Ad Hoc or Managed Penetration Testing: Which One Is Best for You?
Penetration testing is no longer an extraordinary security engagement. Due to regulatory mandates, internal policies, business executive requests and the overall desire to avoid becoming the next breach victim, testing…
Achieve Flexibility in Business Through Digital Trust and Risk Management
I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins…
Grow Your Business With an Evolving Cloud Security Strategy
We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important in the modern landscape, I think we should add one…
Scalable Data Protection Is Critical to Support Data Privacy
Modern privacy regulations are founded on a variety of principles going back to 1890 that sought to protect citizens from “yellow journalism.” Over the following years, governments enacted legislation that…
The Past, Present and Future of Security Information and Event Management (SIEM)
With the release of the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we feel that it is an appropriate time to reflect on the evolution of…
3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020
During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full…
What Are You Protecting Against? Deploying Proper Use Cases Is Critical to Build Security Maturity
Whenever I talk with clients interested in or anxious about cybersecurity, my first question falls to, “What are you protecting against?” Invariably, the initial response comes out as “everything.” While…
IBM X-Force Security Predictions for 2020
With 2019 coming to a close, it’s time to reflect on the year and also look at what the new year will bring. This year, we saw attackers set their…
You Don’t Know What You Don’t Know: 5 Best Practices for Data Discovery and Classification
This is the second installment in a two-part series about data discovery and classification. Be sure to read part one for the full story. Discovering and classifying data across the…