All resources sponsored by:

Atakama

16 Matches
Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE:Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 14 Dec 2020 | Published: 19 Oct 2020
Get This Now


Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE:The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020
Get This Now


How to Eliminate Your Company's Cloud Security Exposure Risks
sponsored by Atakama
RESOURCE:When it comes to the cloud, there are specific risks that CISOs need to be aware of and prepare for prior to their migration. Read this article to learn more about the top threats to cloud computing and discover best practices for combating them.
Posted: 11 Dec 2020 | Published: 27 Jul 2020
Get This Now


Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE:As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020
Get This Now


Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE:Digital transformation has emerged as a key driver to cloud migration – in fact, 83% of workloads are expected to be cloud-based by the end of the year. Securing your data as you migrate it to the cloud is essential. Read this article to learn more about common cloud migration challenges and how to protect your data in transition.
Posted: 10 Dec 2020 | Published: 28 Oct 2020
Get This Now


Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE:Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020
Get This Now


Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats
sponsored by Atakama
RESOURCE:Ransomware attacks have escalated in recent years to include newer, more devious techniques, like file exfiltration. This article looks at why ransomware is escalating and offers best practices for protecting your organizations from these attacks – read on to get started.
Posted: 09 Dec 2020 | Published: 16 Jun 2020
Get This Now


Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE:Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020
Get This Now


Full Disk Encryption: Not What You Might Think
sponsored by Atakama
RESOURCE:In this article, learn why full disk encryption, an approach to securing the contents of hard drives, may not be the solution you might have thought. See how, in some cases, it could even create more security vulnerabilities for users.
Posted: 08 Dec 2020 | Published: 29 Aug 2019
Get This Now


Cloud Enablement
sponsored by Atakama
CASE STUDY:Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.
Posted: 07 Dec 2020 | Published: 07 Dec 2020
Get This Now


Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE:Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020
Get This Now


Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE:Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020
Get This Now


Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY:A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020
Get This Now


Understanding the HIPAA Encryption Requirement
sponsored by Atakama
RESOURCE:Understanding the HIPAA encryption requirements gives healthcare organizations and their business associates a way to protect privacy for data both in-transit and at-rest. In this article, find out how end-to-end encryption enables secure telehealth today.
Posted: 03 Dec 2020 | Published: 03 Dec 2020
Get This Now


How a Regional US Bank Met the Needs of Regulatory Examiners
sponsored by Atakama
CASE STUDY:A large regional US-based commercial bank was written up for several security deficiencies in a prior audit. In response, this bank wanted to deploy meaningful security solutions that went beyond the minimum expectations of regulatory examiners. View this case study to learn how Atakama helped this bank become compliant through encryption.
Posted: 03 Dec 2020 | Published: 30 Sep 2020
Get This Now


Government Contractor
sponsored by Atakama
CASE STUDY:In this case study, find out why a government contractor that provides security details for high profile homeland security missions uses Atakama to secure confidential data received from the government and relating to the secret missions.
Posted: 02 Dec 2020 | Published: 02 Dec 2020
Get This Now

TOPICS:  Security

16 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info