News & Insights by Atakama

Security , Encryption , Compliance

How Encryption Enables CMMC Compliance

As the Defense Industrial Base (DIB) begins preparing to meet Cybersecurity Maturity Model Certification (CMMC) compliance, companies need to know where they fall in the maturity model and how to

Read More
Security , Encryption , Compliance

Revolutionizing Data Security to Protect Against a New Era of Cyber Attacks

With ever increasing frequency we’re seeing an increase of cyberattacks reported in the news. With an unprecedented number of  people working from home , those with the inclination and knowledge of

Read More
Security

5 Best Practices to Enhance Your DLP Strategy

On average, employees in the financial services industry have access to 11 million files as early as their first day on the job, according to this Varonis Report. Securing these files can often prove

Read More
Security

Amid SolarWinds and MS Exchange Attacks, Encryption is Key

There were plenty of reasons to rejoice in 2020’s end: It was the year of companies scrambling to keep security programs on the rails as the pandemic pushed them to remote operations. 

Read More
Partnership Announcement

Partnership Announcement: Atakama Signs Strategic Partnership with Nth Generation

NEW YORK, April 20, 2021 /PRNewswire/ -- Atakama Inc., the data security company that introduced their innovative multi-factor file-level encryption software, is excited to announce their strategic

Read More
Compliance

Understanding the ITAR End-to-End Encryption Rule

The U.S Department of State enacted the March 2020 ITAR amendment, effectively simplifying compliance requirements and modernizing business processes. Most notably, the amendment reduces the burden

Read More
Encryption

Privacy Please Podcast - Interview with Atakama CEO, Daniel H. Gallancy

Check out our new Privacy Please Podcast Episode with Daniel H. Gallancy, CEO of Atakama!

Read More
Compliance

Reinforce Your Data Security By Integrating Data Classification and Multi-Factor File Level Encryption

While the world came to a screeching halt during the COVID pandemic, cybercrime was alive and well with the incessant onslaught of data breaches and ransomware attacks. Recent reports show more than

Read More
Compliance

What You Need to Know About the GDPR Encryption Requirements

Although the European Union (EU) General Data Protection Regulation (GDPR) has been enforced since May 2018, many organizations still struggle to meet compliance requirements. Between January 1,

Read More
Security

How Authenticated Metadata Minimizes the Risk of Data Exposure

In Atakama, each protected file is individually encrypted. This practice is vital to the security that Atakama provides, because only the files which are actively in use are exposed on the user’s

Read More
Security , Encryption , Compliance

Fighting Exfiltration with Data Classification and Encryption

As threat actors continue to launch blistering ransomware attacks, organizations that focus on healthcare and critical infrastructure are getting hammered particularly hard. In the worst cases,

Read More
Security

The Difference Between a Breach and an Incident and Why It Matters

The barrage of cybersecurity headlines is constant. From the explosion of ransomware attacks to an almost 20% increase in phishing websites in 2020, the surge in cyberattacks rides a road paved with

Read More