ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Atakama

  • Amid SolarWinds and MS Exchange Attacks, Encryption is Key

    As the SolarWinds and MS Exchange attacks continue to illustrate the importance of data classification and encryption, Atakama can serve as a last layer of defense, offering protection at the object level even when an adversary has breached other security measures. View this article to learn more.

  • What You Need to Know About the GDPR Encryption Requirements

    As organizations strive to protect their data, encryption has become a method of choice for keeping it safe. But when it comes to personal data – regulated data – encryption standards and methods must comply. Read this article by Atakama to get specific insight and legal nomenclature on the requirements for encrypting personal data under GDPR.

  • Understanding the ITAR End-to-End Encryption Rule

    In this article, take a closer look at the latest amendment to the International Traffic in Arms Regulation (ITAR), which focuses on end-to-end encryption. Read on for an overview of the new rule, who must comply, and more.

  • Reinforce Your Data Security By Integrating Data Classification and Multi-Factor File Level Encryption

    Learn how you can enhance your data discovery and classification tools with the power of Atakama’s multi-factor file-level encryption.

  • Protect Your Data on the Way to the Cloud

    Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.

  • Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security

    The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.

  • How to Eliminate Your Company's Cloud Security Exposure Risks

    When it comes to the cloud, there are specific risks that CISOs need to be aware of and prepare for prior to their migration. Read this article to learn more about the top threats to cloud computing and discover best practices for combating them.

  • Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data

    As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.

  • Protect Your Data on the Way to the Cloud

    Digital transformation has emerged as a key driver to cloud migration – in fact, 83% of workloads are expected to be cloud-based by the end of the year. Securing your data as you migrate it to the cloud is essential. Read this article to learn more about common cloud migration challenges and how to protect your data in transition.

  • Render Zero-Day Attacks Useless on Your Network

    Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.

  • Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats

    Ransomware attacks have escalated in recent years to include newer, more devious techniques, like file exfiltration. This article looks at why ransomware is escalating and offers best practices for protecting your organizations from these attacks – read on to get started.

  • Marrying Threshold Cryptography with Encryption Keys: Why?

    Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.

  • Full Disk Encryption: Not What You Might Think

    In this article, learn why full disk encryption, an approach to securing the contents of hard drives, may not be the solution you might have thought. See how, in some cases, it could even create more security vulnerabilities for users.

  • Cloud Enablement

    Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.

  • Eliminate the Threat of Exfiltrative, Extortive Ransomware

    Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.

  • Phishing: Not Just One Kind of Attack

    Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.

  • Department Store Chain Stays Secure and Compliance

    A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.

  • Understanding the HIPAA Encryption Requirement

    Understanding the HIPAA encryption requirements gives healthcare organizations and their business associates a way to protect privacy for data both in-transit and at-rest. In this article, find out how end-to-end encryption enables secure telehealth today.

  • How a Regional US Bank Met the Needs of Regulatory Examiners

    A large regional US-based commercial bank was written up for several security deficiencies in a prior audit. In response, this bank wanted to deploy meaningful security solutions that went beyond the minimum expectations of regulatory examiners. View this case study to learn how Atakama helped this bank become compliant through encryption.

  • Government Contractor

    In this case study, find out why a government contractor that provides security details for high profile homeland security missions uses Atakama to secure confidential data received from the government and relating to the secret missions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences