Atakama Team

Guide, Zero Trust

Zero Trust Checklist: Multifactor Encryption is at the Heart of Zero Trust Security

There is almost zero chance that you haven’t heard the term “Zero Trust” recently. The term, coined in 2010 by John Kindervag, one of the world's foremost cybersecurity experts, recognizes that trust

Read More
Guide

It’s Cybersecurity Awareness Month! Best Practices for Protecting Sensitive Data from Exfiltration

Fall is our favorite time of year. While some celebrate the season by enjoying the foliage and pumpkin patches, we pay tribute to data security education and recognize October as Cybersecurity

Read More
Ransomware

Are you Ransomware Ready? How to Win the War with Multifactor Encryption

NATO Investigates Attack on Global Missile Defense Firm Critical data was stolen recently from a top European missile systems firm, MBDA. Nato is investigating the leak, which includes classified

Read More
How To

How To Search Through Encrypted Documents

Compliance directives coupled with sophisticated cyber threats have led businesses to adopt a myriad of tactics to meet regulatory requirements and mitigate data security risks. As security

Read More
Security

Mitigate Email-based Security Risks With Encrypted File Transfer

You’ve probably heard a statistic or two about how employee mistakes drive the majority of data loss at organizations. It might come as a surprise, though, that email is the riskiest channel for data

Read More
Security, Encryption

Securing Unstructured Data: A Best Practice Guide to Balance Data Protection and Accessibility

An important component of the current data-driven landscape that businesses operate in is the sheer diversity of sources and formats contributing to the ever-increasing volume and wide distribution

Read More
Encryption, Regulatory Compliance

NACHA Security Rules: A Race Against the Clock to Meet Data Security Requirements

In 2021 The Automated Clearing House Network (ACH) experienced significant growth, processing an unprecedented 5.3 billion B2B payments reflecting a 20.4% increase in volume compared to the prior

Read More
Encryption

Multifactor Encryption Explained

Cryptography and encryption have been trusted for secure communication for thousands of years. Dating back to its use in ancient Egyptian, Greek, and Roman culture to preserve religious knowledge,

Read More
Encryption, Cloud Security

Cloud Encryption: Who is Responsible for The Keys?

Cloud adoption continues to rise as enterprises move more of their workloads and data to cloud infrastructure. When it comes to protecting the sensitive crown jewel data stored by organizations in

Read More
Regulatory Compliance, Privacy

What the CPRA Means for Your Organization

With the passing of California’s Proposition 24 in late 2020, the state updated its groundbreaking California Consumer Privacy Act (CCPA), providing additional clarification around terms and

Read More
Security, Encryption

Data Masking, Tokenization, and Encryption: Which Do I Choose?

Data breaches and ransomware attacks regularly expose sensitive customer or business data. Organizations risk compliance penalties, legal costs, and a loss of customer trust from these incidents.

Read More
Encryption

BigID & Atakama: A New Approach to Data Classification

There really isn’t a data discovery and classification standard; however, many organizations have their version of a data classification framework that classifies data based on its sensitivity and

Read More