Tag : Data Security

Articles C2 Winter 2021 Data Data Security

How to Safeguard Your Data & Applications from Ransomware

Cohesity
It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work...
Articles C2 Winter 2021 Data Security Security

How to Keep Employee Home Wireless Networks from Being Weakest Link your Cybersecurity Chain

Yash Vartak
Now that we are slowly coming out of the COVID-19 Pandemic, work might never return to the “normal” of employees spending the majority of their days in an office building. Remote working, or some hybrid, is...
https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg
Articles C2 Winter 2021 Data Data Security

Getting Started with Data-centric Security

Dan Simmons
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
Articles C2 Winter 2021 Data

To bring strategy back into your security, turn to chess

Ramsés Gallego
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways...
Artificial Intelligence C2 Fall 2021 Data Editors' Picks Open Source Security Zero Trust Security

Securing the edge is no longer enough. SPIFFE can protect your infrastructure

Phil Vachon
Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats......
Agile Development Articles C2 Fall 2021 Data Security Mission Critical

Balancing Agility with Data Security

Thomas Gloerfeld
Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for...
Articles C2 Fall 2021 HPE GreenLake Project Aurora Security Zero Trust Security

Making the move to zero trust architecture: 4 key considerations

Jeff Enters
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...
Articles C2 Fall 2021 GDPR HPE NonStop Compliance Mission Critical Security

GDPR 2021 – Compliance and Penalties; 3 Years Later

Steve Tcherchian
The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR...
Articles C2 Spring 2021 Cloud Data Security

Take a Data Privacy Road Trip

Tobias Fuertjes
Three years ago, I started as a PreSales consultant covering the topics of Data Analysis and Data Management. These topics were directly connected to the topic of Data Privacy and all the regulations around it,...
Articles C2 Spring 2021 Data Security

‘New Nacha supplementing data security requirements coming up’

Thomas Gloerfeld
Nacha is a non-profit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through the development of rules, standards, governance, education,...