News & Insights by Atakama

How To

How To Search Through Encrypted Documents

Compliance directives coupled with sophisticated cyber threats have led businesses to adopt a myriad of tactics to meet regulatory requirements and mitigate data security risks. As security

Read More
Security

Mitigate Email-based Security Risks With Encrypted File Transfer

You’ve probably heard a statistic or two about how employee mistakes drive the majority of data loss at organizations. It might come as a surprise, though, that email is the riskiest channel for data

Read More
Security, Encryption

Securing Unstructured Data: A Best Practice Guide to Balance Data Protection and Accessibility

An important component of the current data-driven landscape that businesses operate in is the sheer diversity of sources and formats contributing to the ever-increasing volume and wide distribution

Read More
Encryption, Regulatory Compliance

NACHA Security Rules: A Race Against the Clock to Meet Data Security Requirements

In 2021 The Automated Clearing House Network (ACH) experienced significant growth, processing an unprecedented 5.3 billion B2B payments reflecting a 20.4% increase in volume compared to the prior

Read More
Encryption

Multifactor Encryption Explained

Cryptography and encryption have been trusted for secure communication for thousands of years. Dating back to its use in ancient Egyptian, Greek, and Roman culture to preserve religious knowledge,

Read More
Encryption, Cloud Security

Cloud Encryption: Who is Responsible for The Keys?

Cloud adoption continues to rise as enterprises move more of their workloads and data to cloud infrastructure. When it comes to protecting the sensitive crown jewel data stored by organizations in

Read More
Regulatory Compliance, Privacy

What the CPRA Means for Your Organization

With the passing of California’s Proposition 24 in late 2020, the state updated its groundbreaking California Consumer Privacy Act (CCPA), providing additional clarification around terms and

Read More
Security, Encryption

Data Masking, Tokenization, and Encryption: Which Do I Choose?

Data breaches and ransomware attacks regularly expose sensitive customer or business data. Organizations risk compliance penalties, legal costs, and a loss of customer trust from these incidents.

Read More
Encryption

BigID & Atakama: A New Approach to Data Classification

There really isn’t a data discovery and classification standard; however, many organizations have their version of a data classification framework that classifies data based on its sensitivity and

Read More
Zero Trust

Zero Trust Begins with File-Level Encryption

Zero trust continues to gain traction as the strategic security approach best suited for today’s hybrid IT environments and mobile workforces. Introduced by Forrester analyst John Kindvervag in 2010,

Read More
Encryption

Busting the Myths of Encryption in the Enterprise

As data breaches continue to spiral out of control, organizations that continue to rely on status quo cyber solutions will suffer incalculable damage. Among the existing solutions that many

Read More
Security, Ransomware

Why Cybersecurity Tools Continue to Fail Against Ransomware

Ransomware attacks remain a top concern for cybersecurity leaders. Businesses of all sizes continue to get held to ransom with malware that encrypts their files and threat actors that exfiltrate

Read More