article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

All too many companies lack a full appreciation of how vital it has become to proactively manage and keep secure “unstructured data.”. One reason for the enduring waves of ransomware is that unstructured data is easy for hackers to locate and simple for them to encrypt. A few takeaways: Outside a database.

article thumbnail

Thales Named Overall Leader in KuppingerCole’s Leadership Compass Data Security Platforms

Thales Cloud Protection & Licensing

Thales offers complementary strengths and excels in proactive data protection and advanced security analyticsensuring organizations can secure their most critical assets with confidence.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: Concentric AI directs Google’s search techniques towards locking down data sprawl

The Last Watchdog

Security teams generally knew which on-premises server held certain batches of both structured and unstructured data; they could narrowly control access to a company’s on-premises data centers, and that was deemed good-enough, security-wise, he says.

article thumbnail

Thales Named Overall Leader in KuppingerCole’s Leadership Compass Data Security Platforms

Security Boulevard

Thales offers complementary strengths and excels in proactive data protection and advanced security analyticsensuring organizations can secure their most critical assets with confidence.

article thumbnail

Best Encryption Software for 2022

eSecurity Planet

That startup – Titaniam – bills itself as “the only practical and scalable data-in-use protection solution,” so it’s one to watch. Top Encryption Software. VeraCrypt is a free, open-source disk encryption software that can be used on Windows, Mac OSX, and Linux systems. Key Differentiators.

article thumbnail

GUEST ESSAY: Recalibrating critical infrastructure security in the wake of evolving threats

The Last Watchdog

In this instance, hackers are suspected to have exploited simple cybersecurity loopholes, including the fact that the software shipped with easy-to-guess default passwords. Unitronics software is used by critical infrastructure (CI) organizations throughout the U.S.

article thumbnail

Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration.

Security Affairs

Government experts discovered sensitive information, including personal data, technical information, classified details, and passwords, in approximately half of the Federal Administration’s files (5,182). “On August, the Government launched an administrative investigation into the data breach. .”