Data Flow Security: Mitigating the Risks of Continuous Data Movement in the...
In today's cloud environments, data movement is widespread due to diverse architectural patterns and extensive organizational access to data. Unmanaged data flows can result in compliance challenges...
View ArticleAn Introduction to Data Detection and Response (DDR)
How long would it take you to respond to a cloud data breach? For most organizations, the answer is far too long. When it takes less than a minute for an authorized user to download an entire...
View ArticleCloud Data Access: From Chaos to Governance
Controlling access to sensitive data is foundational to any cybersecurity strategy. But the cloud adds complications on the road to least privilege. In this post, we delve into the realities of data...
View ArticleUse Context-Aware Data Classification for a Robust Data Security Posture
Enterprises often interpret a data security mandate as identifying configuration issues or vulnerabilities in their data infrastructure. To improve security posture, though, the scope of data security...
View ArticleRansomware in the Cloud: Breaking Down the Attack Vectors
The number of ransomware attacks, especially those involving Amazon S3 buckets, Azure Storage accounts and other cloud assets, has increased in recent years. Still, most organizations don't act to...
View ArticleShadow Data Is Inevitable, But Security Risks Aren’t
Shadow data is inevitable, particularly with the shift to cloud and data democratization. The ease of creating shadow data assets and the potential for faster insights incentivize employees. While...
View ArticleMastering Data Flow: Enhancing Security and Compliance in the Cloud
Many organizations struggle to determine their data’s precise locations and pathways, making it challenging to ensure security and compliance throughout its lifecycle, as it crosses borders and...
View ArticleOpenAI Custom GPTs: What You Need to Worry About
The integration of OpenAI's Custom GPTs with personal data files and third-party APIs offers new opportunities for organizations looking for custom LLMs for a variety of needs. They also open the door...
View Article5 Essential Components of a Cloud DLP Solution
The data loss prevention (DLP) landscape has taken a long while to catch up with the realities of the public cloud. In this post, we’ll explain why this tooling, developed in the on-premises era,...
View ArticleCloud Data Security & Protection: Everything You Need to Know
Sharon Farber / Mar 6 Data is currency for modern businesses. Organizations use data analytics to make decisions about new products and services or to provide better customer experiences. As companies...
View ArticleData Security Platforms: 9 Key Capabilities and Evaluation Criteria
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria What Makes a Cloud Data Security Platform? Recent years have seen a flurry of new technologies and vendors — first in CSPM, and then...
View ArticleAn Incident Response Framework for Cloud Data Security
How do you respond to a security incident? In some cases, the answer might be ‘block first, ask questions later.’ That was common a decade ago in the centralized IT infrastructure. Security teams had...
View ArticlePrisma Cloud DSPM Wins in Cloud-Native Data Security
The 2024 Globee Security Awards Gives Top Honors to Prisma Cloud Data Security Posture Management (DSPM) Solution in Multiple Categories Prisma Cloud DSPM (formerly Dig Security) was named a winner in...
View ArticleRedshift Security: Access and Data Flows Explained
This blog post is the first in a series that exposes security risks, possible attack vectors, and how to hunt and prevent them using data detection and response (DDR). When correctly configured,...
View ArticleRedshift Security: Data Backups and Encryption Best Practices
In this blog post, second in a series, we focus on risks that come from a misconfigured Redshift, like encryption, backups and logs. We’ll explore security features and best practices that can prevent...
View ArticleRedshift Security: Attack Surface Explained
In our previous two posts, Access and Data Flows and Data Backups and Encryption, we discussed security best practices to implement least-privileged access on Redshift and reduce the static risk...
View ArticlePrisma Cloud Data Security Vs. Other CSPM Vendors
Closing the gap on cloud data security is a top priority for today’s enterprises. To answer this need, data security posture management (DSPM) has emerged as one of the most in-demand categories in...
View ArticleHow to Build an Enterprise Data Security Team
Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics. One trend I’ve come across is the...
View ArticleAnnouncing Prisma Cloud AI-SPM: Security and Compliance for AI-Powered Apps
As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management (AI-SPM) is a new set of capabilities that...
View ArticleAre Cloud Serverless Functions Exposing Your Data?
More than 25% of all publicly accessible serverless functions have access to sensitive data, as seen in internal research. The question then becomes, Are cloud serverless functions exposing your data?...
View Article