14% of security leaders balance data security and business objectives

14% of security leaders balance data security and business objectives

A survey from Gartner reveals only 14% of security leaders can balance data security with business objectives for said data. The survey was conducted from June through August in 2024, gathering responses from 318 senior security leaders across the globe, featuring organizations of various industries and sizes.  “With only 14% of SRM leaders able to secure their data while supporting business goals, many organizations can face increased vulnerability to cyber threats, regulatory penalties, and operational…

Read More

The future of enterprise protection: Integrated data security platforms

The future of enterprise protection: Integrated data security platforms

Less than five years ago, one would have been hard-pressed to find information on Data Security Posture Management (DSPM). Today, it is a central pillar of modern cybersecurity strategies. The growth of DSPM from a relatively new technology to a must-have capability of the cybersecurity landscape reflects the growing need for organizations to protect and control their data in the face of increasing complexity in the cloud and the broadening use of AI in the…

Read More

Six AI Predictions For 2025 That Will Reshape How We Think About Enterprise Technology

Six AI Predictions For 2025 That Will Reshape How We Think About Enterprise Technology

The technology industry stands at an inflection point where brute force is giving way to precision, and scale is yielding to sophistication. As we look toward 2025, the first wave of AI adoption—characterized by massive GPU clusters and sprawling implementations—is evolving into something more transformative. This evolution isn’t just about technology; it’s about fundamentally rethinking how we innovate, secure, deploy, and scale AI solutions. The winners in this new landscape won’t be determined by the…

Read More

Protecting healthcare data, improving trust through security measures

Protecting healthcare data, improving trust through security measures

Data security is of paramount concern to all healthcare organizations. In today’s digital age, protecting sensitive medical information is not just a regulatory requirement but a cornerstone of trust and business integrity. Patients and members expect data privacy, but are frequently disappointed by multiple data breaches. There are ways to mitigate data breaches and create an environment where healthcare organizations and the companies that support them can thrive and provide important healthcare services. Safeguarding a…

Read More

Sumit Dhawan: Proofpoint’s Road Map for Unified Data Security

Sumit Dhawan: Proofpoint’s Road Map for Unified Data Security

AI-Driven Cloud Security Services , Data Loss Prevention (DLP) , Endpoint Security Proofpoint CEO Dhawan Discusses DSPM, AI and Human-Centric Cybersecurity Solutions Michael Novinson (MichaelNovinson) • December 27, 2024     Sumit Dhawan, CEO, Proofpoint (Image: Proofpoint) Managing data at rest is as critical as safeguarding data in motion as enterprises move their data to the cloud, said Proofpoint CEO Sumit Dhawan. See Also: Real-World Strategies for Securing Remote Workforces and Data …

Read More

What Payroll Documents Do You Need to Pay Employees?

What Payroll Documents Do You Need to Pay Employees?

Payroll documentation is more than just paperwork — it’s the backbone of your company’s compliance and efficiency. For HR professionals managing payroll across different regions, whether in a global company, a U.S.-only operation, or something in between, understanding which forms and records are required is essential. Getting employees paid at work while meeting tax, social security, and labor law obligations requires the right payroll documents. And with rules that vary from country to country —…

Read More

Strengthening Docker Security: Best Practices for Resilient Containers

Strengthening Docker Security: Best Practices for Resilient Containers

Docker has revolutionized how applications are developed and delivered by enhancing the efficiency and scaling of containerization. However, the rapid proliferation and wide adoption of Docker technology has increased a number of serious security vulnerabilities. The items below enumerate some key approaches towards optimal security in Docker containers.  Key security areas in Docker   Image security:   Base images are the foundation of Docker containers, and ensuring their integrity is paramount. When organizations use untrusted or outdated…

Read More

How AI Is Changing the Cloud Security and Risk Equation

How AI Is Changing the Cloud Security and Risk Equation

The AI boom is amplifying risks across enterprise data estates and cloud environments, according to cybersecurity expert Liat Hayun. In an interview with TechRepublic, Hayun, VP of product management and research of cloud security at Tenable, advised organisations to prioritise understanding their risk exposure and tolerance, while prioritising tackling key problems like cloud misconfigurations and protecting sensitive data. Liat Hayun, VP of product management and research of cloud security at Tenable She noted that while…

Read More

Proofpoint Expands Data Security With Normalyze Acquisition

Proofpoint Expands Data Security With Normalyze Acquisition

Data Loss Prevention (DLP) , Endpoint Security Normalyze’s AI-Powered DSPM Technology Boosts Proofpoint’s Data Visibility, Control Michael Novinson (MichaelNovinson) • October 29, 2024     Proofpoint will make its first acquisition under CEO Sumit Dhawan, scooping up a data security posture management startup led by a longtime former Qualys executive. See Also: 2024 Threat Landscape: Data Loss is a People Problem The Silicon Valley-based email security vendor said its proposed buy of Normalyze will…

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The urgency of security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More
1 2 3 9