Real-World Data Breach Protection Techniques

ROBERT GRESHAM | April 26, 2016

article image
Chasing malware is a never-ending battle, with zero-day threats and new attack tactics showing up every day. The truth is that blocking hackers from entering your network just isn’t a viable strategy anymore. Instead, your security depends on whether you can block sensitive data from exiting it. This white paper examines the importance of data loss prevention (DLP) in today’s advanced cybercrime environment. Read on to learn how you can implement effective DLP and keep your data out of hackers’ hands.

Spotlight

Kryptus EED SA

Founded in 2003 in the city of Campinas/SP, Brazil, Kryptus develops, integrates and deploys a wide array of solutions for hardware, firmware and software, ranging from semiconductors to complex digital certificate management systems, having a highly specialized technical team on cryptographic engineering and information security. Kryptus was named as "Gartner Cool Vendor Brazil 2014" by Gartner, Inc. Kryptus pioneered the field of semiconductors for cryptographic applications in Brazil by introducing the first ASIC AES accelerator. Recently, Kryptus cryptographic module ASI-HSM was the first and is the only HSM to be approved by ITI at its maximum security (MCT7 NSH3), promoting an import step in the Brazilian cryptographic hardware market.

OTHER ARTICLES

Guide to Cloud Security Certification: Which Ones Are the Best of the Best?

Article | April 27, 2021

As your organization looks to move to cloud computing, security certification will become more critical. Cloud solutions have unique security considerations that are different from an on-premise solution. IT professionals that are managing these solutions should be well-versed in multi-layered protection, encryption, monitoring, and more. Not only is certification important for your own IT staff, but it should also be part of your recruiting strategy. Experience combined with certifications can be invaluable foclr protecting your cloud environment. You want to ensure that the data you store in the cloud is protected from security threats.

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

NCSC makes ransomware attack guidance more accessible

Article | February 28, 2020

The UK’s National Cyber Security Centre (NCSC) has updated its guidance to organisations on how to mitigate the impact of malware and ransomware attacks, retiring its standalone ransomware guidance and amalgamating the two in a bid to improve clarity and ease confusion among business and consumer users alike. The NCSC said that having two different pieces of guidance had caused some issues as a lot of the content relating to ransomware was essentially identical, while the malware guidance was a little more up-to-date and relevant. The service said the changes reflect to some extent how members of the public understand cyber security. For example, it implies a distinction between malware and ransomware even though technically speaking, ransomware is merely a type of malware. “Not everyone who visits our website knows that. Furthermore, they might well search for the term ‘ransomware’ (rather than ‘malware’) when they’re in the grip of a live ransomware incident,” said a spokesperson.

Read More

Work From Home: Cyber Security During Covid-19

Article | April 14, 2020

COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis is unparalleled to the past crises that have shaken the world and had lasting impacts on different businesses, economies and societies but the one domain that had remained resilient through all the past crises and is going solid in COVID-19 as well is Cyber security. While most of the sectors globally have been affected, Cybersecurity’s importance to organizations, consumers and home users have not only remained strong but have been increased drastically.

Read More

Spotlight

Kryptus EED SA

Founded in 2003 in the city of Campinas/SP, Brazil, Kryptus develops, integrates and deploys a wide array of solutions for hardware, firmware and software, ranging from semiconductors to complex digital certificate management systems, having a highly specialized technical team on cryptographic engineering and information security. Kryptus was named as "Gartner Cool Vendor Brazil 2014" by Gartner, Inc. Kryptus pioneered the field of semiconductors for cryptographic applications in Brazil by introducing the first ASIC AES accelerator. Recently, Kryptus cryptographic module ASI-HSM was the first and is the only HSM to be approved by ITI at its maximum security (MCT7 NSH3), promoting an import step in the Brazilian cryptographic hardware market.

Events