A Buydown for Risk: Why Data Security is a Must

July 10, 2019

Investments in edge security (end-point and network), continues to grow. Core security (identity management), grows more slowly, but is still a well-established, multibillion-dollar business. A third area of activity, namely data security, is by comparison relatively neglected. Read this white paper to learn why protecting the

Spotlight

Glimmerglass Cyber Solutions

Glimmerglass is a close knit team of talented and dedicated employees who work together to develop complex, innovative solutions to counter cyber attacks for corporations and nations. Distinguished by a history of inventing and developing the world's most advanced products from the Intelligent Optical System to Path Manager, and ultimately the CyberSweep™, we take on hard engineering to solve the world's most intractable problems. We are a tightly connected community working together, cooperating to accomplish the impossible. Glimmerglass professionals are accomplished, talented, and driven to deliver the best performance of their careers.

OTHER WHITEPAPERS
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Security Whitepaper 2023

whitePaper | July 18, 2023

Statype asks a lot from our customers: we ingest sensitive financial, performance, and customer information to generate deep insights. Our customers trust us to get this right because security is a core tenant of everything we build, and we prioritize getting security right

Read More
news image

How Healthcare Can Boost Cyber Security and Close Its Defense Gaps

whitePaper | May 22, 2022

Hackers have made healthcare a top target. As a result, the healthcare industry experienced the highest number of ransomware attacks during Q3 2022, with one in 42 healthcare organizations suffering an attack – in spite of an 8 percent drop in ransomware attacks in Q3.

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More

Spotlight

Glimmerglass Cyber Solutions

Glimmerglass is a close knit team of talented and dedicated employees who work together to develop complex, innovative solutions to counter cyber attacks for corporations and nations. Distinguished by a history of inventing and developing the world's most advanced products from the Intelligent Optical System to Path Manager, and ultimately the CyberSweep™, we take on hard engineering to solve the world's most intractable problems. We are a tightly connected community working together, cooperating to accomplish the impossible. Glimmerglass professionals are accomplished, talented, and driven to deliver the best performance of their careers.

Events