News & Insights by Atakama

Security , Ransomware

Why Cybersecurity Tools Continue to Fail Against Ransomware

Ransomware attacks remain a top concern for cybersecurity leaders. Businesses of all sizes continue to get held to ransom with malware that encrypts their files and threat actors that exfiltrate

Read More
Security , Encryption

How To Implement a Data Centric Security Model

With data breaches continuing to rise in both cost and number, it’s clear existing security approaches aren’t robust enough to protect valuable information assets. Today’s IT environments —

Read More
Security

Data Breach Statistics: 2021 and Beyond

From startups to SMBs to multinational enterprises, data breaches continue to occur with alarming regularity. Necessary changes in how employees do their work have increased breach risks and costs

Read More
Regulatory Compliance

FERPA Compliance - 5 Steps to Protect Student and Family Data

Like many others, the education sector has become a prime target of malicious ransomware attacks resulting in the loss and exposure of highly sensitive student and family data. As gatekeepers of

Read More
Security , Encryption

Multifactor Encryption is Cybersecurity’s Lucky Number 13

Incidents are unavoidable. Incidents are the new normal. Incidents suck. Security practitioners understand this. So they construct their security programs knowing that an incident is inevitable.

Read More
Security , Encryption , Regulatory Compliance , CMMC

How Encryption Enables CMMC Compliance

As the Defense Industrial Base (DIB) begins preparing to meet Cybersecurity Maturity Model Certification (CMMC) compliance, companies need to know where they fall in the maturity model and how to

Read More
Security , Encryption , Regulatory Compliance

Revolutionizing Data Security to Protect Against a New Era of Cyber Attacks

With ever increasing frequency we’re seeing an increase of cyberattacks reported in the news. With an unprecedented number of  people working from home , those with the inclination and knowledge of

Read More
Security

5 Best Practices to Enhance Your DLP Strategy

On average, employees in the financial services industry have access to 11 million files as early as their first day on the job, according to this Varonis Report. Securing these files can often prove

Read More
Security

Amid SolarWinds and MS Exchange Attacks, Encryption is Key

There were plenty of reasons to rejoice in 2020’s end: It was the year of companies scrambling to keep security programs on the rails as the pandemic pushed them to remote operations. 

Read More
Partnership Announcement

Partnership Announcement: Atakama Signs Strategic Partnership with Nth Generation

NEW YORK, April 20, 2021 /PRNewswire/ -- Atakama Inc., the data security company that introduced their innovative multi-factor file-level encryption software, is excited to announce their strategic

Read More
Encryption , Regulatory Compliance , White Paper , Guide , ITAR

Understanding the ITAR End-to-End Encryption Rule

The U.S Department of State enacted the March 2020 ITAR amendment, effectively simplifying compliance requirements and modernizing business processes. Most notably, the amendment reduces the burden

Read More
Encryption

Privacy Please Podcast - Interview with Atakama CEO, Daniel H. Gallancy

Check out our new Privacy Please Podcast Episode with Daniel H. Gallancy, CEO of Atakama!

Read More