News

Old and new protection mechanisms must work together, so it is critical to understand how — or if — existing technology helps or impedes cloud data security. For example, it is necessary to ...
In one example cited by Laminar, an employee may create a copy of a ... “With a majority of the world’s data residing in the cloud, it is imperative that security becomes data-centric and ...
Many organizations are adopting a “wait and see” approach to cloud computing: They’re concerned about the risks of data security. But that means they’re missing out on the benefits of the ...
5 security best practices to implement today to strengthen data protection in your hybrid- or multi-cloud environment. How the Veeam Data Platform integrates natively with your cloud provider to ...
Learn More At a fundamental level, cloud security is data security. Yet, many organizations are struggling to identify and protect the data they’ve stored in the cloud. In fact, research shows ...
It’s become increasingly important for data security professionals to ... Azure Blob containers and Google Cloud buckets can also create unknown or “shadow” data. If that shadow data ...
Earlier this year, Gemalto released its 2018 Global Cloud Data Security Study based on responses from 3,285 IT and IT security practitioners from the US, UK, Australia, Germany, France ...
According to a recent study, 79% of companies had experienced a cloud data breach in the past 18 months—and 67% of respondents had identified security misconfiguration as the top security threat.
Learn More Today, cloud data security provider Dig emerged from stealth with $11 million in seed funding with a new Data Detection and Response (DDR) solution. Dig’s DRR solution discovers ...