data protection
Demystifying SOC 2 Compliance for Startups: A Simple Guide
Navigating the world of SOC 2 compliance can seem daunting for startups. This article breaks down the complexities, explaining what SOC 2 is, why it's important, and how your startup can achieve ...
Veeam Widens Beam to MongoDB, Nutanix & Proxmox VE
Veeam has shown evidence of its capabilities to provide backup, recovery and cybersecurity across an increasing number of heavyweight cloud platforms, databases and service layers including MongoDB and Nutanix ...
Why Tokenization Beats Transparent Data Encryption for PCI DSS Compliance
Cyber-threats are rapidly evolving and breaches are on the rise. That makes compliance with the Payment Card Industry Data Security Standard (PCI DSS) ever more critical for organizations handline sensitive payment card ...
How Financial Institutions Can Manage Mounting Digital Sovereignty Requirements
Financial services is among the most highly regulated of any industry – and justifiably so. As critical infrastructure, the sector provides services which, if interrupted or destabilized, could have a catastrophic impact ...
Protect the Data to Avoid the Cost of Lost Business
Data breaches are growing in volume and cost. Estimates from non-profit the Identity Theft Resource Center (ITRC) reveal that 2023 was a record year for compromise in the US. Over 3,200 incidents ...
Three Reasons to Take a New Cyber-Resilient Approach to Data Protection
To stay future-proof, organizations are beginning to realize the value of adopting a new way of protecting data assets known as a cyber resilience approach ...
How to Implement Data-Centric Security in Google Cloud and BigQuery
AI, analytics and cloud-based data stores are driving a revolution in data-driven decision making. Yet as more organizations adopt these technologies to carve out competitive advantage, they realize that the underlying data ...
As Breach Costs Surge, Companies Need a Better Way to Find Shadow Data
Data breaches are on the rise. In the US, last year broke new records in terms of breach volumes. The bad news is that costs are also increasing. The latest IBM study ...
Fortanix Extends Encyption Key Discovery to On-Premises IT Platforms
Fortanix today extended the reach of its ability to discover encryption keys to on-premises IT environments to enable organizations to more comprehensively manage risks ...
Comparative Analysis of Password Hashing Algorithms: Argon2, bcrypt, scrypt, and PBKDF2
Explore the strengths and weaknesses of Argon2, bcrypt, scrypt, and PBKDF2 in this comprehensive comparison of password hashing algorithms. Learn which algorithm suits your security needs, from cutting-edge Argon2 to the widely-used ...