Search for:
Data Governance Gets a New Impetus
Data governance has often been met with furrowed brows among CIOs — sometimes seen as the broccoli of the IT dinner plate: undoubtedly good for you, but not always eagerly consumed. CIOs often bore the brunt from organizations that were forced to do top-down data governance. With this said, defensive data governance has been a […]


Read More
Author: Myles Suer

Future-Proof Your Cyber Risk Management with These Top Trends in 2024 (Part II)


As shared in part one of this installment, the global marketplace faces an increasingly destructive cyber risk landscape each year, and 2024 is set to confirm this trend. The cost of data breaches alone is expected to reach $5 trillion, a growth of 11% from 2023. As technology advances, attackers continue to develop new, more sophisticated methods […]

The post Future-Proof Your Cyber Risk Management with These Top Trends in 2024 (Part II) appeared first on DATAVERSITY.


Read More
Author: Yakir Golan

The Rise of Zero-Trust Architecture
The cybersecurity landscape in 2024 is marked by complex, multi-faceted threats, necessitating advanced defensive strategies. This complexity arises from the expansive use of digital technologies and the corresponding increase in attack vectors. This evolution demands a nuanced understanding of threat patterns and the adoption of more sophisticated defense mechanisms. The focus now is not just […]


Read More
Author: Ben Herzberg

What to Expect in 2024: The Dominance of Hybrid and Multi-Cloud Architecture


In 2024, the IT landscape will continue to shift and evolve. Driven by the relentless advancement of cloud computing and the growing demand for hybrid and multi-cloud environments, the next year will be marked by several trends that will become more mainstream. From the dominance of cloud-native virtual desktop infrastructure (VDI) solutions to the impact […]

The post What to Expect in 2024: The Dominance of Hybrid and Multi-Cloud Architecture appeared first on DATAVERSITY.


Read More
Author: Amitabh Sinha

What Trends to Expect in 2024 in Enterprise Storage? (Part One)


Looking ahead to the new year, we’ve identified seven trends in enterprise storage for 2024. In part one, we’ll define and explore the first four trends. The remaining three trends will be the focus of part two. This information will help equip you to prioritize and be successful in the new year.  Trend: Freeing up […]

The post What Trends to Expect in 2024 in Enterprise Storage? (Part One) appeared first on DATAVERSITY.


Read More
Author: Eric Herzog

Fast-Tracking SEC Compliance with AI for GRC and Cybersecurity Disclosure


This year, the U.S. Securities and Exchange Commission (SEC) implemented rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure for Public Companies. These rules require listed companies to disclose material cybersecurity incidents within four business days and provide ongoing disclosures related to cybersecurity risk management, strategy, and governance. As the December 15 compliance deadline […]

The post Fast-Tracking SEC Compliance with AI for GRC and Cybersecurity Disclosure appeared first on DATAVERSITY.


Read More
Author: Prasad Sabbineni

Why Are Companies Demanding DLP Functionality?


In an age where data breaches, cyber threats, and privacy violations are commonplace, companies are placing greater emphasis on safeguarding their digital assets. Data Loss Prevention (DLP) functionality has emerged as a critical tool in this endeavor. Although we all understand the consequences and the benefits of protecting data, it is interesting to delve into what’s […]

The post Why Are Companies Demanding DLP Functionality? appeared first on DATAVERSITY.


Read More
Author: Anastasios Arampatzis

Exploring Cloud Computing Risks and Security Hurdles
The worldwide shift toward cloud computing significantly changes how businesses approach data management and operation. Regardless of whether private, public, or hybrid cloud models are employed, the advantages of cloud computing are numerous, including heightened efficiency, reduced expenses, and increased flexibility. Nonetheless, utilizing cloud computing carries potential risks that need to be addressed for sustainable […]


Read More
Author: Joseph Carson

Blockchain-Powered Cybersecurity: Fortifying Digital Defenses in a Decentralized World


In today’s digital age, where data breaches and cyberattacks have become increasingly common, the need for robust cybersecurity measures is more critical than ever. Traditional centralized security systems have proven to be vulnerable to hacking and manipulation, leading to significant losses for individuals and businesses alike. However, emerging technologies like blockchain offer a promising solution […]

The post Blockchain-Powered Cybersecurity: Fortifying Digital Defenses in a Decentralized World appeared first on DATAVERSITY.


Read More
Author: Mohammed Rizvi

4 Benefits of Role-Based Access Control (RBAC) and How to Implement It


Data has become the new gold, and ensuring its security has never been more paramount. As cyber threats evolve, so must our defenses. Enter role-based access control (RBAC), a solution that promises to revolutionize how we think about data access and security. Understanding RBAC RBAC, or role-based access control, is a method of managing access […]

The post 4 Benefits of Role-Based Access Control (RBAC) and How to Implement It appeared first on DATAVERSITY.


Read More
Author: Ben Herzberg

How Cloud Economics Help Businesses Build Cyber Resilience in the Cloud


Cloud computing has enabled many organizations to improve the scalability and flexibility of a variety of crucial business functions. As migration to cloud-based solutions gains momentum, understanding the total cost of cloud adoption is crucial. Cloud economics, in particular, is a framework that has been tailored to evaluate and enhance the financial dimensions of harnessing […]

The post How Cloud Economics Help Businesses Build Cyber Resilience in the Cloud appeared first on DATAVERSITY.


Read More
Author: Dave Russell and Rick Vanover

Data is Risky Business: A Wicked Problem This Way Comes
A recent data security incident in the Police Service of Northern Ireland (PSNI) got me thinking about the idea of wicked problems and data. The data security incident was the disclosure of the names, ranks, and job assignments of every officer and civilian support staff member in the PSNI. This happened due to ‘human error’ […]


Read More
Author: Daragh O Brien

Building Resilient Data Ecosystems for Safeguarding Data Integrity and Security


The term “big data” is no longer the exclusive preserve of big companies. Businesses of all sizes increasingly see the benefits of being data-driven. Various factors have moved along this evolution, ranging from widespread use of cloud services to the availability of more accessible (and affordable) data analytics and business intelligence tools. Effective access to […]

The post Building Resilient Data Ecosystems for Safeguarding Data Integrity and Security appeared first on DATAVERSITY.


Read More
Author: Tamas Kadar

Unique Threat Landscape of Digital Divide
Rural areas worldwide are disconnected in a landscape that nearly requires the internet to work or socially interact. But eventually, the entire planet will have equal, high-speed internet access. Neglecting the digital divide and broadband gap will cause cybersecurity concerns for communities entering the digital era. Regions new to the internet are more vulnerable. Therefore, […]


Read More
Author: Ellie Gabel

Resilience in Data Services Through Mitigation and Prevention
If your company works with data, then you need to work on securing it. When it’s lost or stolen by hackers, it can mean serious trouble for your organization and your bottom line. You must understand what’s at stake, how the data can be easily lost, the steps you can take today to mitigate the […]


Read More
Author: Ainsley Lawrence

Converging IT Observability and Cybersecurity


Only a few years ago, IT teams and their security counterparts worked in separate silos. But as organizations face escalating threats and breaches, there is a burning need to converge IT observability and cybersecurity. The single biggest driver of this convergence is the need to share critical data to help security teams improve cyber resilience. […]

The post Converging IT Observability and Cybersecurity appeared first on DATAVERSITY.


Read More
Author: Heidi Gabrielson

Zero-Trust Data Management Is the Future – How You Can Get Ready Today


In an age of escalating cyber threats, the security approaches of old are no longer adequate to safeguard sensitive data. Traditional strategies have always depended on perimeter-based defenses, believing that dangers originated outside and that – once inside – everything was trustworthy. This strategy, however, is now obsolete due to the inception of perimeter-less work environments […]

The post Zero-Trust Data Management Is the Future – How You Can Get Ready Today appeared first on DATAVERSITY.


Read More
Author: Apu Pavithran

Data Security Posture Management (DSPM): A Technical Explainer


Data is growing on a massive scale – it spreads across geographies, systems, networks, SaaS applications, and multi-cloud. Similarly, data security breaches are following suit and increasing in number (and sophistication) every year. Organizations must modernize their approach to cybersecurity and start giving equal attention to data and infrastructure. Here, data security posture management (DSPM) comes into the […]

The post Data Security Posture Management (DSPM): A Technical Explainer appeared first on DATAVERSITY.


Read More
Author: Anas Baig

Cyber Detection: A Must-Have in Primary Storage


Enterprise storage is a critical component of a comprehensive corporate cybersecurity strategy. If an enterprise does not include cyber storage resilience in their measures to secure their enterprise IT infrastructure, it’s the equivalent of going on vacation and leaving the back door and back windows of your house open, so you have made it easier for criminals […]

The post Cyber Detection: A Must-Have in Primary Storage appeared first on DATAVERSITY.


Read More
Author: Eric Herzog

Privacy, Security & Machine Learning
Data privacy and security matter. Given this, it will be a big deal if machine learning can make them easier to implement. So, how do CIOs and other security thought leaders think machine learning applies to privacy and security? Let’s start by looking at the risks and then discuss how technology makes addressing them easier. […]


Read More
Author: Myles Suer

Protect Data Without a Password
In an increasingly interconnected world, cybersecurity is of the utmost importance for many businesses. In fact, poor security isn’t just a hit to your reputation, it can also be expensive. Businesses of all sizes are looking for ways to mitigate these costs and prepare for cyberattacks. Password-less authentication is one such approach businesses are taking […]


Read More
Author: Ainsley Lawrence

Why Traditional Threat Prevention Is Insufficient for Insider Threats


Security teams can be so focused on blocking cyberattacks from external actors that they forget the potential threats within their organizations. Verizon reports that insider threats cause almost 20% of all breaches.  Insider threats are difficult to defend against using traditional threat prevention measures because insiders inherently require elevated trust and access to get their jobs done. […]

The post Why Traditional Threat Prevention Is Insufficient for Insider Threats appeared first on DATAVERSITY.


Read More
Author: Anastasios Arampatzis

Mitigate Risks and Protect Sensitive Procurement Data
Procurement is an essential function within any organization, involving the acquisition of goods and services necessary for business operations. However, with the rise of digitalization and technology, procurement processes have become increasingly vulnerable to cyber threats. Cybersecurity risks in procurement can result in significant financial loss, reputational damage, and legal liability. Therefore, it is crucial […]


Read More
Author: Marijn Overvest

Boost E-Commerce with Customer Verification
Data breaches have been rampant these days, and many companies realize they need to enhance their customer verification process. Proper customer verifications help prevent young children from accessing products and services that are age sensitive. It also prevents fraudulent transactions from happening online. Businesses have different options to address this issue to reduce the risk, […]


Read More
Author: Juliette Anderson

Most Common Types of Data Breaches
A company that manages data must be always cautious against the potential of data breaches. There are several types of breaches, ranging from a simple human error to large-scale attacks by hostile actors, but any data exposure can have major ramifications for organisations. They are also quite prevalent, with 39% of UK businesses reporting a […]


Read More
Author: Stuart Snape