CYBER SECURITY REPORT JUNE 2019

June 23, 2019

In our first semi-annual report for 2019, DarkMatter documents a growing incidence of cyberattacks across the UAE and the wider Middle East. As cybercriminals keep abreast of emerging developments in technology, they are striking in ever more sophisticated ways and aiming their weapons where they are likely to cause the most damage.

Spotlight

Dataguise

Dataguise precisely detects and protects sensitive information in real time across all repositories so enterprises can safely unlock the benefits of big data. We make data security painless, delivering the only one-stop, out-of-the-box solution that provides the highest level of protection — no customer programming required. With some of the world’s leading Hadoop experts on our team in the US and India, we’re proud to secure the data of some of the largest credit-card processing firms, healthcare organizations, communications/mobile providers, retail brands, and government agencies. Organizations concerned about data breaches, privacy and compliance (PII, PCI-DSS, HIPAA, HITECH, etc.) rely on Dataguise for no-coding/no-scripting discovery, protection, audit and governance for sensitive data in Hadoop, DBMS and other Big Data environments. Dataguise complements volume-level encryption tools and perimeter-based security strategies by providing the most granular cell-level discovery and

OTHER WHITEPAPERS
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

Acronis Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

whitePaper | November 24, 2022

Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four Cyber Protection Operation Centers (CPOCs) around the world to monitor and research cyberthreats 24/7.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More
news image

CyberSecurity Under Stress

whitePaper | August 11, 2022

SecOps teams in the US and UK are being asked to do more with less, leading to higher stress levels that impact both their work and personal lives. The growing risk from cyber attacks is also compounded by significant recruitment and retention issues within cybersecurity.

Read More
news image

The Economic Impact of Cyber Attacks

whitePaper | December 29, 2022

Businesses make up the core of an economy. And cyberattacks are among the topmost risks faced by any business organization irrespective of its size and domain of operation. Therefore, it is well established that cyber-attacks have a significant economic impact. Most of the attacks and breaches are financially motivated.

Read More

Spotlight

Dataguise

Dataguise precisely detects and protects sensitive information in real time across all repositories so enterprises can safely unlock the benefits of big data. We make data security painless, delivering the only one-stop, out-of-the-box solution that provides the highest level of protection — no customer programming required. With some of the world’s leading Hadoop experts on our team in the US and India, we’re proud to secure the data of some of the largest credit-card processing firms, healthcare organizations, communications/mobile providers, retail brands, and government agencies. Organizations concerned about data breaches, privacy and compliance (PII, PCI-DSS, HIPAA, HITECH, etc.) rely on Dataguise for no-coding/no-scripting discovery, protection, audit and governance for sensitive data in Hadoop, DBMS and other Big Data environments. Dataguise complements volume-level encryption tools and perimeter-based security strategies by providing the most granular cell-level discovery and

Events