I’m thrilled to announce CrowdStrike’s agreement to acquire Flow Security, a pioneer in data security posture management (DSPM) and the industry’s first and only cloud data runtime security solution. With this acquisition, CrowdStrike is setting the standard for modern cloud security with complete real-time data protection spanning endpoint and cloud environments, delivering … [Read more...] about CrowdStrike to Acquire Flow Security, Sets Standard for Modern Data Security
data
GhostRace – New Data Leak Vulnerability Affects Modern CPUs
Mar 15, 2024NewsroomHardware Security / Data Protection A group of researchers has discovered a new data leakage attack impacting modern CPU architectures supporting speculative execution. Dubbed GhostRace (CVE-2024-2193), it is a variation of the transient execution CPU vulnerability known as Spectre v1 (CVE-2017-5753). The approach combines speculative execution and race … [Read more...] about GhostRace – New Data Leak Vulnerability Affects Modern CPUs
Secure data is superior data: A security-first approach to the DoD Data Strategy
From a technical standpoint, starting with secure data is a strategic way to map your architecture and decide on technology investments. If data is not secure, then it is impossible to effectively achieve any other guiding principle of the DoD Data Strategy. Security should serve as the essential foundation for meeting all the other goals, of data being interoperable, … [Read more...] about Secure data is superior data: A security-first approach to the DoD Data Strategy
What’s the difference? Elastic and Splunk data tiers
Layer A: Data is usually first written here, and we have the best possible performance for indexing and search.Layer B: Data is moved here from other layers and it is searchable, although the performance is not as good as the above layer. Data is backed up to an object store and does not require any user action for archival or restore — it is done automatically by the … [Read more...] about What’s the difference? Elastic and Splunk data tiers
As Threats Evolve, Data Protection Is Paramount
Today’s cybersecurity landscape poses one of the most significant risks to data. This holds true for organizations of all sizes, across all industries, tasked with protecting their most essential data amid an increasingly regulated environment and faster, more innovative adversaries. Recent years have introduced a steady drumbeat of new data privacy regulations. There are now … [Read more...] about As Threats Evolve, Data Protection Is Paramount
Why Your Logging Data and Bills Get Out of Hand
In the labyrinth of IT systems, logging is a fundamental beacon guiding operational stability, troubleshooting, and security. In this quest, however, organizations often find themselves inundated with a deluge of logs. Each action, every transaction, and the minutiae of system behavior generate a trail of invaluable data—verbose, intricate, and at times, overwhelming. The sheer … [Read more...] about Why Your Logging Data and Bills Get Out of Hand
MongoDB Suffers Security Breach, Exposing Customer Data
Dec 17, 2023NewsroomCyber Attack / Data Security MongoDB on Saturday disclosed it's actively investigating a security incident that has led to unauthorized access to "certain" corporate systems, resulting in the exposure of customer account metadata and contact information. The American database software company said it first detected anomalous activity on December 13, 2023, … [Read more...] about MongoDB Suffers Security Breach, Exposing Customer Data
China’s MIIT Introduces Color-Coded Action Plan for Data Security Incidents
Dec 16, 2023NewsroomCyber Security / Incident Response China's Ministry of Industry and Information Technology (MIIT) on Friday unveiled draft proposals detailing its plans to tackle data security events in the country using a color-coded system. The effort is designed to "improve the comprehensive response capacity for data security incidents, to ensure timely and effective … [Read more...] about China’s MIIT Introduces Color-Coded Action Plan for Data Security Incidents
Preventing Microsoft Copilot Data Exposure
Microsoft Copilot has been called one of the most powerful productivity tools on the planet. Copilot is an AI assistant that lives inside each of your Microsoft 365 apps — Word, Excel, PowerPoint, Teams, Outlook, and so on. Microsoft's dream is to take the drudgery out of daily work and let humans focus on being creative problem-solvers. What makes Copilot a different beast … [Read more...] about Preventing Microsoft Copilot Data Exposure
Transform Your Data Security Posture – Learn from SoFi’s DSPM Success
Nov 28, 2023The Hacker NewsData Security / Posture Management As cloud technology evolves, so does the challenge of securing sensitive data. In a world where data duplication and sprawl are common, organizations face increased risks of non-compliance and unauthorized data breaches. Sentra's DSPM (Data Security Posture Management) emerges as a comprehensive solution, offering … [Read more...] about Transform Your Data Security Posture – Learn from SoFi’s DSPM Success