An Introduction to Data Detection and Response (DDR)
How long would it take you to respond to a cloud data breach? For most organizations, the answer is far too long. When it takes less than a minute for an authorized user to download an entire...
View ArticleElevating Data Security Beyond Cyber Monday
Cyber Monday, a major sales event in the e-commerce calendar, ushers in an extraordinary influx of online traffic and shopping activities during the holiday season. Many organizations use significant...
View ArticleShadow Data Is Inevitable, But Security Risks Aren’t
Shadow data is inevitable, particularly with the shift to cloud and data democratization. The ease of creating shadow data assets and the potential for faster insights incentivize employees. While...
View Article5 Essential Components of a Cloud DLP Solution
The data loss prevention (DLP) landscape has taken a long while to catch up with the realities of the public cloud. In this post, we’ll explain why this tooling, developed in the on-premises era,...
View ArticleCloud Data Security & Protection: Everything You Need to Know
Data is currency for modern businesses. Organizations use data analytics to make decisions about new products and services or to provide better customer experiences. As companies collect, store,...
View ArticleData Security Platforms: 9 Key Capabilities and Evaluation Criteria
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria What Makes a Cloud Data Security Platform? Recent years have seen a flurry of new technologies and vendors — first in CSPM, and then...
View ArticleAchieving Cloud Data and Compliance: How You Can Make It Work
When it comes to sensitive data, the ‘wild west’ approach that characterized the early 2000s is gone. Dozens of data protection frameworks have emerged amid increased regulation and concerns over...
View ArticleAn Incident Response Framework for Cloud Data Security
How do you respond to a security incident? In some cases, the answer might be ‘block first, ask questions later.’ That was common a decade ago in the centralized IT infrastructure. Security teams had...
View ArticleRedshift Security: Access and Data Flows Explained
This blog post is the first in a series that exposes security risks, possible attack vectors, and how to hunt and prevent them using data detection and response (DDR). When correctly configured,...
View ArticleRedshift Security: Attack Surface Explained
In our previous two posts, Access and Data Flows and Data Backups and Encryption, we discussed security best practices to implement least-privileged access on Redshift and reduce the static risk...
View ArticlePrisma Cloud Data Security Vs. Other CSPM Vendors
Closing the gap on cloud data security is a top priority for today’s enterprises. To answer this need, data security posture management (DSPM) has emerged as one of the most in-demand categories in...
View ArticleHow to Build an Enterprise Data Security Team
Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics. One trend I’ve come across is the...
View Article