Data is undoubtedly the most important element in an organization. Securing data during these testing pandemic times is a tightrope walk not just for data security heads, but for CEOs too. Here is a list of the top 10 data leaks that have cost Fortune 500 companies dearly – and how such tragedies can be averted.
The crown Jewels, part of the Royal Collection, are the most powerful symbols of the British Monarchy. They are most valued and given tightened security protection to prevent from being stolen.
Similarly, Mission-critical, intellectual property is an organization’s ‘crown jewels’ and would cause major business impact if compromised.
Read more on how to protect your SAP crown jewels with a Zero Trust approach.
Zero Trust is the new Buzz word in the cyber security arena. Ever since, Forrester Analyst, Kindervag introduced the term Zero Trust, traditional security measures have become obsolete.
Learn more about the five guiding principles to consider before implementing a Zero Trust Architecture.
Read why he says that, what it means for your company and how you can protect yourself .
It is a fact that no one likes to talk about. Swiss companies are spied upon, their secrets revealed and their data sold. The damage can be humongous. There are many cases that remain under lock and key and rarely appear in the media.
No crime is perfect. Every thief leaves behind a ‘signature’ – even in the digital world. But what if he tries to erase it and leave no trace behind? Can it be done? Is there a way to make sure that footprints cannot be erased? This is what Dr. Heiner Kromer has to say.
What stops senior management from seriously considering data-centric security as an important aspect of their overall IT security paradigm? Are they misled? Or is it plain complacency that data breach would happen to them? This is what Dr. Heiner Kromer, CEO, SECUDE has to say.
Marriott, Facebook, Instagram, First American Financial Corp, Capital One, Zoll Medical, Georgia Tech, Federal Emergency Management Agency (FEMA), and others. What’s common to them all? Well, they are all in the 2019 Data Loss Hall of Shame.
Despite the growing complexity of threats that faces enterprises today, data security practitioners need to be agile and keep in mind the bigger threat picture. While this does translate to dynamic response mechanisms and constantly evolving security paradigms, those responsible for data security shouldn’t lose sight of the ‘small’ things, for as they say, the devil is in the details.
Have you taken all the steps to throw your data into the winds? If not, you should read this blog post. Leaving your data to the wolves isn’t as easy as you think. Here’s why…