backup Malware

CRM Backup Trends to Watch on World Backup Day

With World Backup Day approaching, many organizations are increasing their attention to potential security threats and blindspots in their backup processes ...
Security Boulevard
From Past to Present: User Authentication's Evolution and Challenges

From Past to Present: User Authentication’s Evolution and Challenges

From the humble beginnings of legacy authentication mechanisms to today's sophisticated technologies, the journey of user authentication has been a captivating evolution marked by relentless innovation ...
RBAC tickets

Why RBAC for Data Reigns Supreme in the Age of Cloud Threats

Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant cracks against modern threats. This is where ...
Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0

Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0

| | Data Security, NIST
On February 26, 2024, NIST released version 2.0 of the Cybersecurity Framework. This blog reviews the fundamental changes introduced in CSF 2.0 and data-centric security considerations that should be made when aligning ...
SEC rules, cybersecurity, SEC cyber data breach rules

Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule

The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard
How No/Low Code CIAM Balances Security and User Engagement?

How No/Low Code CIAM Balances Security and User Engagement?

Discover the revolutionary No/Low Code CIAM world, where robust security meets seamless user engagement. Learn why developers are turning to this solution, explore real-world use cases, and see how LoginRadius is leading ...
NetApp data broker FTC location data

NetApp Leverages AI to Make File System Ransomware Resistant

NetApp embedded artificial intelligence capabilities in its ONTAP file system that can identify ransomware threats in real time ...
Security Boulevard
Navigating the Waters of Generative AI

Navigating the Waters of Generative AI

| | AI, Data Security, generative AI
Part I: The Good and the Bad of AI Few would argue that 2023 was the year AI, specifically generative AI (Gen AI) like ChatGPT, was discussed everywhere. In October, Forrester published ...
AI, cyber GRC, Microsoft AI cybersecurity

The xSPM Trend: Security Posture Management for Everything

The xSPM trend represents a holistic approach to managing and enhancing the security posture of diverse IT assets ...
Security Boulevard