Data Protection

data backups immutability

How Do Data Backup Systems Become “Truly Immutable” and Inaccessible to Threat Actors?

When discussing with clients the merits of data backups as a means of cyber defense — and resiliency — I will use the word “immutability.” The simple explanation around immutability means that the data can’t be altered, encrypted, or deleted […]

How Do Data Backup Systems Become “Truly Immutable” and Inaccessible to Threat Actors? Read More »

Proofpoint Voice of the CISO report

Human Error and AI Emerge as Key Challenges in Survey of CISOs

The 2024 Proofpoint “Voice of the CISO” report is a useful barometer for understanding the current cybersecurity landscape, providing valuable insights from 1,600 CISOs globally. This year’s findings reveal a complex picture where heightened concerns coexist with a growing sense

Human Error and AI Emerge as Key Challenges in Survey of CISOs Read More »

Aqua Security cloud native shadow IT generative

Aqua Security Uncovers Exposed Corporate Secrets in Personal Projects

Aqua Security’s Nautilus team has uncovered several instances where developers unknowingly exposed confidential corporate information through their personal side projects. This alarming discovery underscores the growing risks associated with shadow IT and the skyrocketing use of generative AI tools. As

Aqua Security Uncovers Exposed Corporate Secrets in Personal Projects Read More »

data detection response DDR threat intelligence

Data Detection and Response: Enhancing Threat Intelligence and Incident Response

As data naturally lives and breathes, gets copied, shared, expanded, collaborated on, and distributed, the many lives of a single piece of information can be extraordinarily hard to keep track of, much less protect. The industry has responded with a

Data Detection and Response: Enhancing Threat Intelligence and Incident Response Read More »

Scroll to Top