background preloader

Daseraus

Facebook Twitter

dasera

Protecting Student Data by Dasera Infographic. When most people think of data risks, they think of big bang security breaches and compromised PII at famous hotel chains, retailers, or an airline.

Protecting Student Data by Dasera Infographic

It’s rare to see stories of a hospital accidentally exposing PHI making the big headlines that it should. Even without a hacker, stories of data used poorly through its lifecycle should be a cause for concern. This time we bring you another such infographic story on student data. We’ve witnessed a lot of bad actors in the cybersecurity world in 2020, but there is no attack more sinister than that on children’s personal data. Today, we’re going to explore the increasing number of cyberattacks on educational institutions and the tough questions security professionals in the education industry need to be asking. [Press Release] Dasera Releases Data Lifecycle Trust and Privacy Report on Data Privacy Day. Cloud Data Lifecycle Security startup Dasera announced today that it has released its research findings on how consumers feel about brands who use their personal data and how it is protected, providing fresh insight into helping businesses understand these concerns.

[Press Release] Dasera Releases Data Lifecycle Trust and Privacy Report on Data Privacy Day

The results of the survey reveal the majority of all respondents have less trust in how businesses use or protect their data compared to 5 years ago. Data Security Services. Cloud Data Life Cycle. Cybersecurity Management. Protecting Student Data by Dasera Infographic. Cyber Threat Management. Cyber Threat Management. Cyber security Solution. Dasera's Latest Yellowstone Release: Data Classification, Tagging, Policy Editor. Thanks for checking out Dasera’s new release.

Dasera's Latest Yellowstone Release: Data Classification, Tagging, Policy Editor

To give it some character, we’re calling it Yellowstone. Why Yellowstone Yellowstone National Park is the first US National Park and is known for its many geothermal features, including Old Faithful Geyser. Cloud Data Threat Scenarios. In today’s digital age, companies have more access than ever before to people’s PII, and general consumer data.

Cloud Data Threat Scenarios

As companies handle more and more data, they become more vulnerable to data breaches. As 21st-century technology evolves, so too does the threat landscape and there is nowhere CISO’s should apply the magnifying glass closer than on their own employees. With so many businesses moving to a remote work environment, the organization perimeter has disappeared. The line between insiders and outsiders is blurring, making you more vulnerable e.g. to credential theft. The Red Book of Insider Threats. Featured Executive Protection from insider threats depends on training insiders, knowing the value of the data in question, asking how easy it is to monetize this data, and, of course, discovering the unknown factor of motivation.

The Red Book of Insider Threats

Along those lines, we should see changes in controls, deterrence, threat response, and bigger adoption in behavioral analytics. Privacy will play a big role around citizen monitoring. Social media, lifestyle, and personal situations can all influence or motivate someone depending on the situation. Certain data classifications may warrant that level of surveillance. Cyber Security Services. Building an insider threat program for Cyber Security Solutions. In today’s digitized world, organizations capture & store an enormous amount of consumer data.

Building an insider threat program for Cyber Security Solutions

This data is leveraged for valuable insights to drive business growth. While data has powered some of the most rewarding business innovations over the last decade, there’s a real challenge with protecting consumer data and privacy. Data breaches happen all the time - this year alone we will have almost 5,000 reported internal data breaches (as estimated by the Ponemon Institute). A data breach cost organizations millions of dollars in fines, remediations, and lost revenue. As per the 2020 Cost of Insider Threats Global Report by the Ponemon Institute, the average cost of an internal data breach is $11.5 million. Data Privacy Services.

History of the Data Warehouse. In today’s enterprises, data warehouses are business-critical tools for analysis and decision making tools.

History of the Data Warehouse

But how did we get here? Where did data warehouses actually come from? Igor Urisman, senior software engineer at Dasera, walks you through the fascinating evolution of data warehouses. 1. The Batch (1970 - 1985) A data warehouse is just a specialized database, and the initial ideas around data warehousing were developed within the broader field of database management systems (DBMS). How to built ultimate Insider Threats Programme. Three Unique Insider Breaches Explained with Infographic. Five Cloud Data Threat Scenarios Protect The Internal Data. How can CISOs Enable Internal Data & Analytics Adoption. What do Snapchat and Managed Health Services of Indiana have in common?

How can CISOs Enable Internal Data & Analytics Adoption

Both have been subjected to data breaches caused by insiders. According to a Washington Post article at the time of the Snapchat breach, “The attacker pretended to be Snapchat chief executive Evan Spiegel and tricked an employee into emailing over the information...” In the case of Managed Health Services, an article from HIPAA Journal reports “A phishing attack on a business associate of Managed Health Services has potentially resulted in the disclosure of some plan members PHI ... employees of LCP Transportation responded to phishing emails and provided the attacker with credentials that allowed their email accounts to be remotely accessed.”

Cyber Security Breaches. Red book of Insider Threats Winter 2020. Dasera Presents on Insider Threats at RSA Conference 2020. Hello world, We’re so excited to launch our blog with this exciting news: we were chosen as a TOP THREE Launch Pad startup at RSA Conference 2020!

Dasera Presents on Insider Threats at RSA Conference 2020

Read the announcement from RSA here. How was RSAC 2020? Apart from using lots of Purell and doling out elbow handshakes and air hugs, the entire Dasera team was on the ground, meeting prospects, partners, investors, and other vendors. We learned a lot about the security industry by attending many interesting talks on and off the show floor.

But the highlight of the whole show was our co founder and CTO Dr. Things We Did That You Can Adopt Easily. Staying positive (and realistic) is the middle of a pandemic is tough.

Things We Did That You Can Adopt Easily

If you haven't already, please read Thi Thumasathit's personal take on how he does it. Staying positive is important not only to individuals. It is also important for organizations. Especially in times like these, when most businesses are operating remotely. There are many great tips out there. (A little COVID+WFH humor) Having all employees working remotely is a new paradigm for many businesses. We also need to ensure that social distancing does not create social isolation. Protecting Sensitive Data Through Query Inspection. (This is a blog series on SQL Queries by the Dasera Engineering team. In this first edition, Dasera co-founder and CTO Noah Johnson discusses an often overlooked internal risk: queries executed by insiders) Companies are collecting petabytes of consumer data. This data is extremely valuable: it generates insights, informs business decisions, improves efficiency, and creates competitive advantage.

Why everyone have a blind spot for insider threats? At RSA 2020 (ah, the good old pre-pandemic days when we still had trade shows), I met with a PR firm with a substantial cybersecurity practice. I asked them, “Hey, is it just me, or do insider breaches not get as much media coverage as outsider breaches?” Their response: Outsider breaches are a lot more sensational and get a lot more media attention. It’s sexy to write about a group of hacktivists who penetrated someone’s perimeter with a complex, 12-step hack.

It’s not so sexy to write about an employee with an axe to grind.” Cybersecurity Mashup: Insider Threats. Hello earthlings, look out from your windows. Winter's gone. It's spring! As you jumped from one web conference call to another and the world adjusted to a new normal, we did a quick media reconnaissance. The intent - to summarize all that's going on in the world of cybersecurity and insider threats. We'd be remiss if we did not begin with a quick and respectful nod to the COVID-19 pandemic. Trolls had a field day with Zoom-bombing. End result - security teams are on overdrive. You Had me at Trust. Cybersecurity Insiders.

Insider Threat Blogs for 2020. CISOs and their teams have to be on their toes all the time. Businesses continuously acquire and store more data, documents, code, and IP. All of which is accessed and used by a variety of insiders - employees, consultants, partners, customers. And so, the threat of information breaches always looms large over security teams. Some of the world’s biggest brands have fallen prey to insider breaches.

Data Security Services. There was an insider breach today. And yesterday. And the day before, and the day before that. In fact, there’s been an insider data breach every day for the last 10 years. The business world has become data-driven. Cyber Security Threats. Cyber Security Threats. Queries: the Ground Truth for Internal Data Security. Insider Interanal Threats. Dasera: Automatically ensures safe querying of sensitive data.