Combating Cybersecurity Challenges with Advanced Analytics

August 19, 2019

Cyber crimes and security threats have grown at an exponential rate in recent years, and the momentum is only growing. According to Juniper Research, over 146 billion records will be exposed through criminal data breaches from 2018 to 2023, growing at a rate of 22.5% per year.1 This builds on the astounding number of data breaches reported over the past few years. In a recent report from Identity Theft Resource Center (ITRC), the number of breached customer records containing personally identifiable information (PII) skyrocketed by 126% from 2017 to 2018, with a staggering total of around 446 million records leaked.2 Significant 2018 breaches include those experienced by Facebook,3 Under Armour4 and Marriott International.

Spotlight

Baffle, Inc.

Baffle was founded to battle the increasing threats to enterprise assets in public and private clouds. Our founders come from strong backgrounds in security, storage and enterprise application development. Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing. Unlike other solutions that only encrypt data at-rest and in-flight, Baffle’s solution keeps data encrypted while it is being processed by databases and applications.

OTHER WHITEPAPERS
news image

Reveal Risk Whitepaper: Measuring And Managing Cyber Resilience

whitePaper | March 3, 2023

Cyber Resilience (according to NIST) is “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.” Resiliency in cybersecurity is not a new concept. It has long been postulated as a goal or used to convey that a business needs to be ready for the unpredictable that can and will arise in a volatile cyber-risk climate. However, we have seen that there is a disconnect between current practices for evaluating & leading cyber programs, and understanding, measuring, & building true cyber resiliency.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

The State of Ransomware 2022

whitePaper | April 20, 2022

Sophos' annual study of the real-world ransomware experiences of IT professionals working at the frontline has revealed an ever more challenging attack environment together with the growing financial and operational burden ransomware places on its victims. It also shines new light on the relationship between ransomware and cyber insurance, and the role insurance is playing in driving changes to cyber defenses.

Read More
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More

Spotlight

Baffle, Inc.

Baffle was founded to battle the increasing threats to enterprise assets in public and private clouds. Our founders come from strong backgrounds in security, storage and enterprise application development. Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing. Unlike other solutions that only encrypt data at-rest and in-flight, Baffle’s solution keeps data encrypted while it is being processed by databases and applications.

Events