Category: Security Research

Tips from the payment card industry for maintaining cloud compliance

A complex IT environment demands a complex data compliance plan. Agent-based software and other traditional approaches to compliance are products of an industry that’s been maturing for a long time, and such solutions were designed …

The post Tips from the payment card industry for maintaining cloud compliance appeared first on DataGravity Blog.

The security threat 88 percent of companies are missing

Let’s say you’ve been tasked with assessing and updating your company’s security technologies. First, you take stock of the threats it’s recently faced. You investigate system failures, third-party attacks and instances of phishing, ransomware and …

The post The security threat 88 percent of companies are missing appeared first on DataGravity Blog.

Don’t grow security maturity the hard way: Lessons from the NIST Framework

For a long time, when an attacker set out to breach a company’s network, the process was a lot like a physical burglary. The attacker would research the target (i.e. ‘case the joint’), get in …

The post Don’t grow security maturity the hard way: Lessons from the NIST Framework appeared first on DataGravity Blog.

Scroll to top