background preloader


Facebook Twitter


Cloud Data Life Cycle. Cybersecurity Management. Protecting Student Data by Dasera Infographic. When most people think of data risks, they think of big bang security breaches and compromised PII at famous hotel chains, retailers, or an airline.

Protecting Student Data by Dasera Infographic

It’s rare to see stories of a hospital accidentally exposing PHI making the big headlines that it should. Even without a hacker, stories of data used poorly through its lifecycle should be a cause for concern. This time we bring you another such infographic story on student data. We’ve witnessed a lot of bad actors in the cybersecurity world in 2020, but there is no attack more sinister than that on children’s personal data.

Today, we’re going to explore the increasing number of cyberattacks on educational institutions and the tough questions security professionals in the education industry need to be asking. Cyber Threat Management. Cyber Threat Management. Cyber security Solution. Dasera's Latest Yellowstone Release: Data Classification, Tagging, Policy Editor. Thanks for checking out Dasera’s new release.

Dasera's Latest Yellowstone Release: Data Classification, Tagging, Policy Editor

To give it some character, we’re calling it Yellowstone. Why Yellowstone Yellowstone National Park is the first US National Park and is known for its many geothermal features, including Old Faithful Geyser. Our first mega release is virtually erupting with new features, and we take inspiration from hotspots in this park to bring you enhanced visibility, governance and data protection capabilities. Cloud Data Threat Scenarios. In today’s digital age, companies have more access than ever before to people’s PII, and general consumer data.

Cloud Data Threat Scenarios

As companies handle more and more data, they become more vulnerable to data breaches. As 21st-century technology evolves, so too does the threat landscape and there is nowhere CISO’s should apply the magnifying glass closer than on their own employees. With so many businesses moving to a remote work environment, the organization perimeter has disappeared. The Red Book of Insider Threats. Featured Executive Protection from insider threats depends on training insiders, knowing the value of the data in question, asking how easy it is to monetize this data, and, of course, discovering the unknown factor of motivation.

The Red Book of Insider Threats

Along those lines, we should see changes in controls, deterrence, threat response, and bigger adoption in behavioral analytics. Privacy will play a big role around citizen monitoring. Social media, lifestyle, and personal situations can all influence or motivate someone depending on the situation. Cyber Security Services. Building an insider threat program for Cyber Security Solutions. In today’s digitized world, organizations capture & store an enormous amount of consumer data.

Building an insider threat program for Cyber Security Solutions

This data is leveraged for valuable insights to drive business growth. While data has powered some of the most rewarding business innovations over the last decade, there’s a real challenge with protecting consumer data and privacy. Data breaches happen all the time - this year alone we will have almost 5,000 reported internal data breaches (as estimated by the Ponemon Institute).

A data breach cost organizations millions of dollars in fines, remediations, and lost revenue. Data Privacy Services. History of the Data Warehouse. In today’s enterprises, data warehouses are business-critical tools for analysis and decision making tools.

History of the Data Warehouse

But how did we get here? Where did data warehouses actually come from? Igor Urisman, senior software engineer at Dasera, walks you through the fascinating evolution of data warehouses. 1. The Batch (1970 - 1985) How to built ultimate Insider Threats Programme. Three Unique Insider Breaches Explained with Infographic. Five Cloud Data Threat Scenarios Protect The Internal Data. How can CISOs Enable Internal Data & Analytics Adoption. What do Snapchat and Managed Health Services of Indiana have in common?

How can CISOs Enable Internal Data & Analytics Adoption

Both have been subjected to data breaches caused by insiders. According to a Washington Post article at the time of the Snapchat breach, “The attacker pretended to be Snapchat chief executive Evan Spiegel and tricked an employee into emailing over the information...” Cyber Security Breaches. Red book of Insider Threats Winter 2020. Dasera Presents on Insider Threats at RSA Conference 2020. Hello world, We’re so excited to launch our blog with this exciting news: we were chosen as a TOP THREE Launch Pad startup at RSA Conference 2020!

Dasera Presents on Insider Threats at RSA Conference 2020

Read the announcement from RSA here. How was RSAC 2020? Things We Did That You Can Adopt Easily. Staying positive (and realistic) is the middle of a pandemic is tough.

Things We Did That You Can Adopt Easily

If you haven't already, please read Thi Thumasathit's personal take on how he does it. Staying positive is important not only to individuals. It is also important for organizations. Especially in times like these, when most businesses are operating remotely. There are many great tips out there. Protecting Sensitive Data Through Query Inspection. (This is a blog series on SQL Queries by the Dasera Engineering team.

Protecting Sensitive Data Through Query Inspection

In this first edition, Dasera co-founder and CTO Noah Johnson discusses an often overlooked internal risk: queries executed by insiders) Companies are collecting petabytes of consumer data. This data is extremely valuable: it generates insights, informs business decisions, improves efficiency, and creates competitive advantage. Extracting value from the data requires giving access to data analysts, so it’s no surprise that companies are expanding internal data access. Historically, access was given only to a small number of trusted employees.

Why everyone have a blind spot for insider threats? At RSA 2020 (ah, the good old pre-pandemic days when we still had trade shows), I met with a PR firm with a substantial cybersecurity practice. I asked them, “Hey, is it just me, or do insider breaches not get as much media coverage as outsider breaches?” Their response: Cybersecurity Mashup: Insider Threats. Hello earthlings, look out from your windows. Winter's gone. It's spring! As you jumped from one web conference call to another and the world adjusted to a new normal, we did a quick media reconnaissance. The intent - to summarize all that's going on in the world of cybersecurity and insider threats. We'd be remiss if we did not begin with a quick and respectful nod to the COVID-19 pandemic. Cybersecurity Insiders. Insider Threat Blogs for 2020. CISOs and their teams have to be on their toes all the time. Businesses continuously acquire and store more data, documents, code, and IP.

All of which is accessed and used by a variety of insiders - employees, consultants, partners, customers. And so, the threat of information breaches always looms large over security teams. Some of the world’s biggest brands have fallen prey to insider breaches. McKinsey estimates that more than 50%1 of all data breaches involve an insider. 34% of data breaches in the 2019 Verizon Data Breach Investigations Report2 involved internal actors. Data Security Services. There was an insider breach today. And yesterday. And the day before, and the day before that. In fact, there’s been an insider data breach every day for the last 10 years. Cyber Security Threats. Cyber Security Threats. Queries: the Ground Truth for Internal Data Security. Insider Interanal Threats.

Dasera: Automatically ensures safe querying of sensitive data.