In this new era, every enterprise is suddenly "cloud first." But there are significant data security gaps to avoid before putting critical data in the cloud. Imperva's Terry Ray shares strategies to maximize simplicity and regulatory compliance.
During the pandemic, two unusual and apparently unrelated trends have emerged - the rapid growth of the MSS (Managed Security Services) market and an increased demand for complex compliance management.
Read the latest CyberTheory Market report, Convergence of Compliance and MSSP/MDR results in a New Service...
The year 2021 will see an increase in third-party risks, the evolution of MSSPs, and maturity in identity governance as enterprises in the Middle East region take a fast track approach to the 'cloud-first' strategy, according to a panel of experts.
Despite the soaring list of customers reporting data breaches tied to the May ransomware attack on Blackbaud - and numerous legal actions filed against the company - the fundraising software vendor recently told Wall Street that it expects cyber insurance to cover the bulk of its costs associated with the incident.
Reducing misconfigurations, monitoring malicious activity, and preventing unauthorized access are foundational activities necessary to ensure security and compliance of applications and data in the cloud. As criminals become more sophisticated in their abilities to exploit cloud misconfiguration vulnerabilities,...
To help ensure security as India moves to digital payments, enterprises need to educate their customers to help them understand potential risks and take the right precautions, says payments expert Navin Surya.
The latest edition of the ISMG Security Report analyzes the hacking of Dave, a mobile banking app. Plus: Sizing up the impact of GDPR after two years of enforcement and an assessment of IIoT vulnerabilities.
Now more than ever we continue to hear about cloud security lapses and high-profile breaches in the news. However, if you dig deeper into the details behind each of these breaches, you'd find that many vulnerabilities could have been avoided if the cloud environment was configured according to cloud security best...
Privileged access management is more critical as a result of the shift to telework during the COVID-19 pandemic and the ongoing movement of applications and data to the cloud, says Dr. Yask Sharma, CISO of a large national critical infrastructure organization in India, who outlines essential PAM components.
It is a lot for IT teams to handle a remote workforce. Keeping up with security issues, maintaining data compliance, and minimizing data loss are some of the challenges IT teams are facing today.
In this webinar, we will cover how IT and security teams can empower end-users working remotely by increasing their...
Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning."
Compliance has long been a fact of life for IT and security teams. Compliance regulations originated as efforts to ensure data security and have since mushroomed into constantly changing and overwhelming challenges that consume disproportionate amounts of an organization's resources.
In this whitepaper, you'll...
The Reserve Bank of India's plans to create a self-regulatory organization by April to help oversee the digital payments system could help reduce the complexity of RBI's efforts to help ensure payments security, some security experts say.