Mobile app creation: Why data privacy and compliance should be at the forefront

In today’s mobile app landscape, providing customers with the most tailored and personal experience possible is essential to edging out competitors. But creating such a custom-made experience requires collecting personal data – and when considering the criticism massive tech companies are garnering for their misuse of sensitive information – mobile app developers must prioritize data […]

Continue Reading

Caveonix and AWS Security Hub integration enriches data for improved risk and compliance posture

Caveonix announces its integration with Amazon Web Services (AWS) Security Hub. Security Hub provides a central repository to view and monitor findings and alerts, and through the two-way integration with Caveonix Cloud, customers can assess data around their security and compliance posture in a centralized, intuitive dashboard. Through this integration, Caveonix Cloud and AWS cloud-native […]

Continue Reading

Fivetran Business Critical delivers enterprise-grade security to address sensitive data requirements

Fivetran announced the addition of a new product tier that offers a set of key security-related features for enterprises: Fivetran Business Critical. Building on its ability to fully manage data pipelines, Fivetran now offers enterprises the highest level of protection for sensitive data. Fivetran Business Critical enables them to create a more secure modern data […]

Continue Reading

Product showcase: ESET Cybersecurity Awareness Training

Engaging training scenarios, plus robust phishing simulation and reporting capabilities ESET is a market-leading cybersecurity provider, offering a comprehensive security platform for organizations throughout the world. To counter the complex attacks used by today’s cybercriminals, ESET uses a multi-faceted approach combining research and intelligence; malware detection and removal; and employee education. This combination addresses the […]

Continue Reading

Most businesses to accelerate data security investments in 2021

71 percent of enterprise executives reported their organization’s data and AI timelines have accelerated since the onset of the COVID-19 pandemic, with one in four reporting their data initiatives have significantly accelerated, according to Protegrity. When asked their organization’s top data security priorities for the next six-to-12 months, 72 percent of respondents cited the need […]

Continue Reading

How to secure data one firewall at a time

The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to ensure security and governance without frustrating users or slowing innovation. By taking advantage of the as-a-service strategy, which has revolutionized IT and transformed […]

Continue Reading

Kensington’s cross-platform solutions enable secure biometric authentication for any device

Kensington introduced two new cross-platform solutions that feature the latest in biometric authentication, enabling secure biometric authentication in the office, at home, or abroad, on services that include Google, Facebook, Microsoft, and more, on any operating system. VeriMark Guard USB-C Fingerprint Key (K64709WW) and VeriMark Guard USB-A Fingerprint Key (K64708WW) offer an easy-to-use, highly-reliable authentication […]

Continue Reading

Thales provides data security and identity protection capabilities through Google Workspace

Thales announced that its CipherTrust Manager and SafeNet Trusted Access have been integrated with Google Workspace Client-side encryption (beta coming soon), a new privacy and confidentiality offering for Google Workspace users. Providing enhanced key management capabilities and identity protection, customers can benefit from improved regulatory compliance and data ownership by allowing them to maintain ownership […]

Continue Reading