Off-the-shelf intelligent automation beats custom ECM monitoring
Monday, October 14, 2024 by Austin Harris
The accumulation of digital information is overwhelming, and the reliance on increasing access must be recognized. The danger in this climate is that storage capacity can be quickly consumed if structured and unstructured data are not adequately managed. More storage can lead to more costs and complexity - especially regarding compliance mandates. On top of that, more t...
AWS introduces Mithra advanced threat intelligence neural network
Thursday, August 15, 2024 by Freeman Lightner
In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...
Ransomware prevention platform ProLion sees large increase in revenue
Monday, October 24, 2022 by Freeman Lightner
ProLion has recorded an 80 percent increase in revenue for FY2022, driven by the addition of over 250 new customers worldwide. The uplift has been driven by demand for its ransomware protection solution CryptoSpike, which has soared as a result of the rise in ransomware and ransomware-as-a-service attacks.
The company also reported a renewal rate of 89...
Red Hat OpenShift now available for IBM and LinuxONE
Tuesday, February 18, 2020 by Brittany Hainzinger
Red Hat OpenShift Container Platform is generally available for IBM Z® and IBM LinuxONE™.
“Containers are the next generation of software-defined compute that enterprises will leverage to accelerate their digital transformation initiatives,” says Gary Chen, Research Director at IDC. “IDC estimates that 71% of organizations are in the proce...
Data Privacy Day 2020 is here
Tuesday, January 28, 2020 by Richard Harris
Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure.
Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...
Container security considerations for developers
Monday, October 29, 2018 by Richard Harris
On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...
Dataguise recognized in MarketsandMarkets datacentric security report
Thursday, January 25, 2018 by Austin Harris
Dataguise was cited a new report titled Data-Centric Security Market Global Forecast to 2022 published by IT research firm MarketsandMarkets. In the report, analysts forecast the global data-centric security market to grow from USD $1.79 Billion in 2016 to USD $5.83 Billion by 2022, at a compound annual growth rate (CAGR) of 23.1%. The report indicates that sensitive da...
Over 90 percent of healthcare IT networks have IoT devices connected
Thursday, July 20, 2017 by Austin Harris
ZingBox has released the results of its survey of IT decision-makers within the healthcare industry. The survey, fielded in early July, found that the majority of healthcare IT networks have IoT devices and that most IT departments believe that existing security solutions for laptops and servers can also protect connected medical devices.More than 90% of healthcare IT n...
Metadata can be deadly in cyber exploitation
Tuesday, July 18, 2017 by Austin Harris
When someone says "There's no cause for concern, it's only metadata" you can send them this:Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data po...
The data security money pit
Wednesday, January 25, 2017 by Richard Harris
93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...
CA Identity Suite now includes integration with CA Privileged Access Manager
Thursday, December 1, 2016 by Richard Harris
CA Technologies has announced a new release of CA Identity Suite that includes integration with CA Privileged Access Manager for governance of privileged accounts and new, flexible deployment options for agility, speed and ease-of-use in identity management and access governance helping to save time and save money. Privileged User Governance Helps Mitigate Insider ...
MarkLogic 9 NoSQL Database Released in Preview
Friday, May 13, 2016 by Richard Harris
MarkLogic has released MarkLogic 9 in preview, offering updates to the NoSQL database for integrating data from silos. MarkLogic is optimized for structured and unstructured data providing the ability allowing to store, manage, query and search across JSON, XML, RDF, geospatial data, text, and large binaries.New features in MarkLogic 9 include:Data Integration: MarkLogi...
Guidelines to Identify and Protect Against Internal Network Security Threats
Friday, February 19, 2016 by Stuart Parkerson
APCON, a provider of intelligent network monitoring solutions, has published a new guide to identify and protect against internal network security threats. The publication, “Safeguarding Your Network from Insider Threats,” highlights the impact of data breaches and internal threats, which despite receiving less public attention, can be just as dangerous and damaging as ...
What You Need to Know about BYOD Security
Wednesday, December 2, 2015 by Jayaraman Gopal
As employees bring their own devices to work, IT teams face an assortment of challenges, from managing mobile apps on a myriad of different devices to backing up and restoring business data. But bar none, the greatest burden for IT staff is securing business data on mobile devices.The Good, the Bad, and the Ugly (in Reverse Order)The UglyThe BYOD phenomenon has spawned ...