All resources sponsored by:

Atakama

17 Matches
Amid SolarWinds and MS Exchange Attacks, Encryption is Key
sponsored by Atakama
RESOURCE:As the SolarWinds and MS Exchange attacks continue to illustrate the importance of data classification and encryption, Atakama can serve as a last layer of defense, offering protection at the object level even when an adversary has breached other security measures. View this article to learn more.
Posted: 03 May 2021 | Published: 03 May 2021
Get This Now


What You Need to Know About the GDPR Encryption Requirements
sponsored by Atakama
RESOURCE:As organizations strive to protect their data, encryption has become a method of choice for keeping it safe. But when it comes to personal data – regulated data – encryption standards and methods must comply. Read this article by Atakama to get specific insight and legal nomenclature on the requirements for encrypting personal data under GDPR.
Posted: 21 Apr 2021 | Published: 17 Feb 2021
Get This Now

TOPICS:  Data Encryption

Understanding the ITAR End-to-End Encryption Rule
sponsored by Atakama
JOURNAL ARTICLE:In this article, take a closer look at the latest amendment to the International Traffic in Arms Regulation (ITAR), which focuses on end-to-end encryption. Read on for an overview of the new rule, who must comply, and more.
Posted: 21 Apr 2021 | Published: 08 Apr 2021
Get This Now

TOPICS:  Cybersecurity

Reinforce Your Data Security By Integrating Data Classification and Multi-Factor File Level Encryption
sponsored by Atakama
RESOURCE:Learn how you can enhance your data discovery and classification tools with the power of Atakama’s multi-factor file-level encryption.
Posted: 20 Apr 2021 | Published: 20 Apr 2021
Get This Now


Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE:Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 14 Dec 2020 | Published: 19 Oct 2020
Get This Now


Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE:The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020
Get This Now


How to Eliminate Your Company's Cloud Security Exposure Risks
sponsored by Atakama
RESOURCE:When it comes to the cloud, there are specific risks that CISOs need to be aware of and prepare for prior to their migration. Read this article to learn more about the top threats to cloud computing and discover best practices for combating them.
Posted: 11 Dec 2020 | Published: 27 Jul 2020
Get This Now


Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE:As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020
Get This Now


Why You Should Care About the NY DFS Cybersecurity Regulation
sponsored by Atakama
RESOURCE:Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 10 Dec 2020 | Published: 19 Oct 2020
Get This Now


Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE:Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020
Get This Now


Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats
sponsored by Atakama
RESOURCE:Ransomware attacks have escalated in recent years to include newer, more devious techniques, like file exfiltration. This article looks at why ransomware is escalating and offers best practices for protecting your organizations from these attacks – read on to get started.
Posted: 09 Dec 2020 | Published: 16 Jun 2020
Get This Now


Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE:Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020
Get This Now


Full Disk Encryption: Not What You Might Think
sponsored by Atakama
RESOURCE:In this article, learn why full disk encryption, an approach to securing the contents of hard drives, may not be the solution you might have thought. See how, in some cases, it could even create more security vulnerabilities for users.
Posted: 08 Dec 2020 | Published: 29 Aug 2019
Get This Now


Cloud Enablement
sponsored by Atakama
CASE STUDY:Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.
Posted: 07 Dec 2020 | Published: 07 Dec 2020
Get This Now


Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE:Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020
Get This Now


Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE:Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020
Get This Now


Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY:A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020
Get This Now


17 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences