Quantcast
Channel: Data Detection and Response Archives - Palo Alto Networks Blog
Browsing all 12 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

An Introduction to Data Detection and Response (DDR)

How long would it take you to respond to a cloud data breach? For most organizations, the answer is far too long. When it takes less than a minute for an authorized user to download an entire...

View Article


Image may be NSFW.
Clik here to view.

Elevating Data Security Beyond Cyber Monday

Cyber Monday, a major sales event in the e-commerce calendar, ushers in an extraordinary influx of online traffic and shopping activities during the holiday season. Many organizations use significant...

View Article

Shadow Data Is Inevitable, But Security Risks Aren’t

Shadow data is inevitable, particularly with the shift to cloud and data democratization. The ease of creating shadow data assets and the potential for faster insights incentivize employees. While...

View Article

Image may be NSFW.
Clik here to view.

5 Essential Components of a Cloud DLP Solution

The data loss prevention (DLP) landscape has taken a long while to catch up with the realities of the public cloud. In this post, we’ll explain why this tooling, developed in the on-premises era,...

View Article

Image may be NSFW.
Clik here to view.

Cloud Data Security & Protection: Everything You Need to Know

Data is currency for modern businesses. Organizations use data analytics to make decisions about new products and services or to provide better customer experiences. As companies collect, store,...

View Article


Image may be NSFW.
Clik here to view.

Data Security Platforms: 9 Key Capabilities and Evaluation Criteria

Data Security Platforms: 9 Key Capabilities and Evaluation Criteria What Makes a Cloud Data Security Platform? Recent years have seen a flurry of new technologies and vendors — first in CSPM, and then...

View Article

Image may be NSFW.
Clik here to view.

Achieving Cloud Data and Compliance: How You Can Make It Work

When it comes to sensitive data, the ‘wild west’ approach that characterized the early 2000s is gone. Dozens of data protection frameworks have emerged amid increased regulation and concerns over...

View Article

Image may be NSFW.
Clik here to view.

An Incident Response Framework for Cloud Data Security

How do you respond to a security incident? In some cases, the answer might be ‘block first, ask questions later.’ That was common a decade ago in the centralized IT infrastructure. Security teams had...

View Article


Image may be NSFW.
Clik here to view.

Redshift Security: Access and Data Flows Explained

This blog post is the first in a series that exposes security risks, possible attack vectors, and how to hunt and prevent them using data detection and response (DDR). When correctly configured,...

View Article


Image may be NSFW.
Clik here to view.

Redshift Security: Attack Surface Explained

In our previous two posts, Access and Data Flows and Data Backups and Encryption, we discussed security best practices to implement least-privileged access on Redshift and reduce the static risk...

View Article

Image may be NSFW.
Clik here to view.

Prisma Cloud Data Security Vs. Other CSPM Vendors

Closing the gap on cloud data security is a top priority for today’s enterprises. To answer this need, data security posture management (DSPM) has emerged as one of the most in-demand categories in...

View Article

Image may be NSFW.
Clik here to view.

How to Build an Enterprise Data Security Team

Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics. One trend I’ve come across is the...

View Article
Browsing all 12 articles
Browse latest View live