Protecting unstructured data | ITProPortal

Around 59 zettabytes (ZB) of data – that’s 59 with 21 zeros after it – were expected to be created, captured, copied and consumed in the world, according to Global DataSphere from International Data Corporation (IDC). The ratio of unique data created and captured to data copied and consumed, is roughly 1:9, but the trend is toward less unique and …

Tovább a bejegyzéshez

Lack of cybersecurity expertize stopping financial firms from protecting their data

Last year, financial organizations that keep their apps and data in the cloud  suffered all kinds of cybersecurity incidents, all due to the lack of in-house security knowledge. These are the findings presented in the 2021 Cloud Data Security Report, issued by cloud security company Netwrix. Polling 937 IT professionals worldwide, Netwrix found that more than half (59 percent) of …

Tovább a bejegyzéshez

Protecting the supply chain: Hardening systems to safeguard vaccine distribution and other critical functions

Security teams began 2021 on high-alert, following a year of unexpected pandemic challenges and one of the most notable supply chain attacks to-date. While the SolarWinds attack posed the greatest threat for high-value targets across government, critical infrastructure, and the private sector, the impact of the attack far exceeds the list of organizations affected. The event initiated a global reckoning …

Tovább a bejegyzéshez

Patenting AI and protecting intellectual property

Computer technologies such as Artificial Intelligence (AI) and machine learning are being adopted in fields far from their origins in computer science. In fact, AI is helping to drive forward innovation in almost every industry – from self-driving cars to personal assistants such as Siri and Alexa. The pace of innovation is astounding yet unsurprising given the positive impact this …

Tovább a bejegyzéshez

Protecting information in the “gig economy”

As workforces continue to evolve and adapt to the Covid-19 pandemic, the door is open for organizations to hire workers from anywhere around the country to offer their skills remotely as needed, often as a freelancer or gig worker. While this outgrowth of the burgeoning gig economy stands to benefit many businesses in need, it’s important that you assess your …

Tovább a bejegyzéshez

Protecting data when it is most vulnerable

Most organizations understand need to protect data against cyber-attacks and data breaches by using encryption. Unfortunately, even the most well-informed and well-intentioned fail to encrypt their data when and where it is most vulnerable. Too often, they are not getting the protection they think they are when implementing full disk encryption or when told by email hosts, cloud storage and …

Tovább a bejegyzéshez