data protection

The Evolution of Hashing Algorithms: From MD5 to Modern Day
Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...

Innovation or Security? Solving the CIO’s Dilemma
The life of a CIO is not dissimilar to that of a trapeze artist. The reason we’re able to soar so high is because of the safety net beneath. Remove that, and ...

The EU AI Act and the Need for Data-Centric Security
Artificial intelligence (AI) is already embedded deep into the economic and social fabric of the world. It does everything from operating website chatbots to authenticating users with their bank. It keeps planes ...

Threat Actors Are Finding it Easier Than Ever to Breach Cyber-Defenses: Enter Data-Centric Security
Global end-user spending on information security is projected to hit $212bn next year, an increase of 15% from 2024, according to Gartner. Yet at the same time, data breach costs continue to spiral. The latest IBM report ...

Hackers Want Your Customers’ Data: It’s Time to Hit Back
Customer trust is critical to long-term business success. But it is dramatically undermined when organizations fail to protect their personally identifiable information (PII). One study claims that two-thirds (66%) of US consumers ...

Rubrik Allies to Cisco to Improve Cyber Resiliency
Rubrik and Cisco have allied to improve cyber resiliency by integrating their respective data protection and extended detection and response (XDR) platforms ...

Top 10 data governance tools for 2024
While artificial intelligence and big data steal the spotlight, a less glamorous but equally crucial discipline is quietly shaping the future of business: data governance. With The post Top 10 data governance ...

Demystifying SOC 2 Compliance for Startups: A Simple Guide
Navigating the world of SOC 2 compliance can seem daunting for startups. This article breaks down the complexities, explaining what SOC 2 is, why it's important, and how your startup can achieve ...

Veeam Widens Beam to MongoDB, Nutanix & Proxmox VE
Veeam has shown evidence of its capabilities to provide backup, recovery and cybersecurity across an increasing number of heavyweight cloud platforms, databases and service layers including MongoDB and Nutanix ...

Why Tokenization Beats Transparent Data Encryption for PCI DSS Compliance
Cyber-threats are rapidly evolving and breaches are on the rise. That makes compliance with the Payment Card Industry Data Security Standard (PCI DSS) ever more critical for organizations handline sensitive payment card ...