News & Insights by Atakama

Encryption , Cloud Security

Cloud Encryption: Who is Responsible for The Keys?

Cloud adoption continues to rise as enterprises move more of their workloads and data to cloud infrastructure. When it comes to protecting the sensitive crown jewel data stored by organizations in

Read More
Regulatory Compliance , Privacy

What the CPRA Means for Your Organization

With the passing of California’s Proposition 24 in late 2020, the state updated its groundbreaking California Consumer Privacy Act (CCPA), providing additional clarification around terms and

Read More
Security , Encryption

Data Masking, Tokenization, and Encryption: Which Do I Choose?

Data breaches and ransomware attacks regularly expose sensitive customer or business data. Organizations risk compliance penalties, legal costs, and a loss of customer trust from these incidents.

Read More
Encryption

BigID & Atakama: A New Approach to Data Classification

There really isn’t a data discovery and classification standard; however, many organizations have their version of a data classification framework that classifies data based on its sensitivity and

Read More
Zero Trust

Zero Trust Begins with File-Level Encryption

Zero trust continues to gain traction as the strategic security approach best suited for today’s hybrid IT environments and mobile workforces. Introduced by Forrester analyst John Kindvervag in 2010,

Read More
Encryption

Busting the Myths of Encryption in the Enterprise

As data breaches continue to spiral out of control, organizations that continue to rely on status quo cyber solutions will suffer incalculable damage. Among the existing solutions that many

Read More
Security , Ransomware

Why Cybersecurity Tools Continue to Fail Against Ransomware

Ransomware attacks remain a top concern for cybersecurity leaders. Businesses of all sizes continue to get held to ransom with malware that encrypts their files and threat actors that exfiltrate

Read More
Security , Encryption

How To Implement a Data Centric Security Model

With data breaches continuing to rise in both cost and number, it’s clear existing security approaches aren’t robust enough to protect valuable information assets. Today’s IT environments —

Read More
Security

Data Breach Statistics: 2021 and Beyond

From startups to SMBs to multinational enterprises, data breaches continue to occur with alarming regularity. Necessary changes in how employees do their work have increased breach risks and costs

Read More
Regulatory Compliance

FERPA Compliance - 5 Steps to Protect Student and Family Data

Like many others, the education sector has become a prime target of malicious ransomware attacks resulting in the loss and exposure of highly sensitive student and family data. As gatekeepers of

Read More
Security , Encryption

Multifactor Encryption is Cybersecurity’s Lucky Number 13

Incidents are unavoidable. Incidents are the new normal. Incidents suck. Security practitioners understand this. So they construct their security programs knowing that an incident is inevitable.

Read More
Security , Encryption , Regulatory Compliance , CMMC

How Encryption Enables CMMC Compliance

As the Defense Industrial Base (DIB) begins preparing to meet Cybersecurity Maturity Model Certification (CMMC) compliance, companies need to know where they fall in the maturity model and how to

Read More