Data Security
CRM Backup Trends to Watch on World Backup Day
With World Backup Day approaching, many organizations are increasing their attention to potential security threats and blindspots in their backup processes ...
Security Boulevard
From Past to Present: User Authentication’s Evolution and Challenges
From the humble beginnings of legacy authentication mechanisms to today's sophisticated technologies, the journey of user authentication has been a captivating evolution marked by relentless innovation ...
Why RBAC for Data Reigns Supreme in the Age of Cloud Threats
Sushant Rao, SVP of Marketing | | Data encryption, Data Security, privacy regulations, sensitive data
Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant cracks against modern threats. This is where ...
IoT Consumer Labeling Goes Global – What This Means for Vendors and Consumers
Carsten Rhod Gregersen | | Compliance, Connected Devices, Cyber Resilience Act, cybersecurity standards, Data Security, Device redevelopment, European legislation, Fines for non-compliance, GDPR (General Data Protection Regulation), Internet of Things (IoT)
IoT producers must comprehend the relevant rules, consult legal and technological experts and evaluate cybersecurity procedures ...
Security Boulevard
Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0
On February 26, 2024, NIST released version 2.0 of the Cybersecurity Framework. This blog reviews the fundamental changes introduced in CSF 2.0 and data-centric security considerations that should be made when aligning ...
Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule
The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard
How No/Low Code CIAM Balances Security and User Engagement?
Discover the revolutionary No/Low Code CIAM world, where robust security meets seamless user engagement. Learn why developers are turning to this solution, explore real-world use cases, and see how LoginRadius is leading ...
NetApp Leverages AI to Make File System Ransomware Resistant
NetApp embedded artificial intelligence capabilities in its ONTAP file system that can identify ransomware threats in real time ...
Security Boulevard
Navigating the Waters of Generative AI
Part I: The Good and the Bad of AI Few would argue that 2023 was the year AI, specifically generative AI (Gen AI) like ChatGPT, was discussed everywhere. In October, Forrester published ...
The xSPM Trend: Security Posture Management for Everything
Gilad David Maayan | | ASPM, Cloud Security, cspm, Data Security, identity, Kubernetes Security, Software Security
The xSPM trend represents a holistic approach to managing and enhancing the security posture of diverse IT assets ...
Security Boulevard