dcsimg

What is a Data Security Platform? Definition, Benefits and More

In simple terms, Data Security Platforms (DSPs) are a type of data security solution that aims to combine a suite of traditionally siloed tools. Most Data Security Platforms will combine functionality designed to locate and protect data on-premises and in the cloud. The most popular functionality included in DSPs include data discovery and classification, privileges/permissions analytics, … [Read more...]

The HIPAA Security Rule Explained

It is estimated that a HIPAA violation on average will cost an organization around $1.1 million in settlement fees. That’s before the loss in revenue that accompanies a data breach, as well as the costs of breach notifications, forensics, lawsuits and other key implications. The more accurate figure when all that is taken into consideration is closer to $8 million. Can your organization afford to … [Read more...]

Businesses Not Able to Recover from Cyber-Security Incidents Quickly Enough

According to a recent poll carried out by cybersecurity firm NTT Security, 59% of respondents said that they were not confident that they could resume “business as usual” 24 hours after a cyber security incident. The poll was conducted over Twitter and attracted approximately 5,500 participants. Businesses were also asked about what their main concerns were when responding to a … [Read more...]

Why Aren’t There More Women in Cybersecurity?

The lack of women in cybersecurity has been a major talking point over the last few years, as well it should be. There have been several studies that suggest women comprise as little as 10% of the cybersecurity workforce, and that this number has not improved by any significant amount. We sat down with a specialist IT recruiter to find out why there was such a disparity between the number … … [Read more...]

Are CISOs in High Demand?

It seems as though the demand for CISOs in the job market today is higher than ever before. CISOs are demanding higher salaries and are being given more responsibility at board level. To find out just how in demand CISOs are, we sat down with Nathan Powell of Henderson Scott – recruitment specialists in IT – to ask for his expert opinion on cybersecurity and the demand for CISOs. So … Read … [Read more...]

How CISOs Can Talk to the Rest of the Board About Data Security

We all know by now that cybersecurity isn’t just an IT problem. The dramatic effects a data breach can have on an organization, in terms of both reputation and damages from non-compliance, mean that everyone from the CMO to the CEO needs to be concerned about data security. One of the biggest problems organizations face is that their employees, particularly those with elevated privileges, … [Read more...]

LepideAuditor – a Real Alternative to Varonis

A few questions we get asked on a regular basis are “how do we compare with Varonis?” and “are Lepide a Varonis competitor?” To answer this question, I’ve created this blog and, whilst I’ve tried to be as unbiased as I can, clearly, I have a favorite. It’s also important to know this blog is in many places anecdotal, created from information obtained either from direct customer feedback or … [Read more...]

How the NIST Framework Helps Improve Data Security

In the aftermath of the Marriott breach, one of the biggest data breaches we’ve seen in 2018, it’s relevant to revisit some core security principles and how they can help you improve the security your data. One such principle is the National Institute of Standards and Technology Framework (or NIST Framework for short). NIST released the first version of their Framework back in February of 2014, … [Read more...]

8 Key Data Security Trends to Watch Out For in 2019

It’s that time of year again where we give you a little peak into what our security specialists believe will be the dominant data security trends in 2019. This year, we’ve highlighted 8 trends that have built up significant steam in 2018 and are ready to explode heading into the new year. So, let’s get started. 1. Wider Adoption of Data-Centric Audit & Protection There has been a lot of … [Read more...]

How Can We Prevent Employees Violating Security Policies?

Employees violate security policies on a regular basis, hence why the majority of data breaches are caused by insiders, in some way or another. Sure, sometimes security incidents are caused by disgruntled or opportunistic employees; however, most of the time the motives are less suspicious. So, what are the main reasons employees violate security policies? 1. A Lack of Security Awareness Training … [Read more...]