Cloud computing saved many organizations during the pandemic as they rapidly recalibrated to support mass home working and reach more customers...
Nov 3, 2022 l Data Protection, Data Breaches, Asia-Pacific
Breaches at Australian Firms Highlight Need for Data-centric Security
In the security industry we often talk about industry trends with a detached, generalist viewpoint. It’s only when real incidents happen and...
Oct 20, 2022 l Data Protection, Compliance, EMEA
NIS 2 is Coming: What Does it Mean for your Business?
Amidst all the publicity surrounding the drafting, adoption and enforcement of GDPR, it’s easy to forget about a lesser-known set of EU security...
Oct 13, 2022 l Data Protection, Research, Trends, and Predictions
Understanding Gartner’s Vision for Format-Preserving Encryption
Global organizations are increasingly outsourcing computing capabilities to drive innovation and growth. Some 92% were estimated to have a...
Oct 4, 2022 l Data Protection, Big Data Analytics, Cloud Computing
3 Reasons Why Your Data Analytics Environment Needs Better Protection
Are your cloud environments secure enough to defend your data from bad actors and ensure compliance with regulatory obligations? Many databases, data...
Sep 29, 2022 l Data Protection, Data Discovery & Classification
Why Data Discovery is the First Step to Effective Data-Centric Security
In a world of IT complexity, escalating cyber risk and rigorous compliance requirements, data-centric security is winning favor with a growing number...
Cloud computing is the driving force behind digital transformation. During the pandemic it empowered organizations to rapidly support home working...
Sep 14, 2022 l Data Protection, Big Data Analytics, Cloud Computing
How to Protect Data on Snowflake with comforte Data Security Platform
Snowflake is one of the leading data warehousing solutions available today; its high performant and cloud-based design has been enabling thousands of...
Sep 8, 2022 l Data Protection, Data Breaches
Mitigating the Threat to Sensitive Data from Malicious Third Parties
The battleground between threat actors and network defenders is increasingly coming down to one thing: data. It could be the sensitive personal...