News & Insights by Atakama

Regulatory Compliance

Reinforce Your Data Security By Integrating Data Classification and Multi-Factor File Level Encryption

While the world came to a screeching halt during the COVID pandemic, cybercrime was alive and well with the incessant onslaught of data breaches and ransomware attacks. Recent reports show more than

Read More
Regulatory Compliance

What You Need to Know About the GDPR Encryption Requirements

Although the European Union (EU) General Data Protection Regulation (GDPR) has been enforced since May 2018, many organizations still struggle to meet compliance requirements. Between January 1,

Read More
Security

How Authenticated Metadata Minimizes the Risk of Data Exposure

In Atakama, each protected file is individually encrypted. This practice is vital to the security that Atakama provides, because only the files which are actively in use are exposed on the user’s

Read More
Security, Encryption, Regulatory Compliance

Fighting Exfiltration with Data Classification and Encryption

As threat actors continue to launch blistering ransomware attacks, organizations that focus on healthcare and critical infrastructure are getting hammered particularly hard. In the worst cases,

Read More
Security

The Difference Between a Breach and an Incident and Why It Matters

The barrage of cybersecurity headlines is constant. From the explosion of ransomware attacks to an almost 20% increase in phishing websites in 2020, the surge in cyberattacks rides a road paved with

Read More
Partnership Announcement

Partnership Announcement: Atakama Expands Channel Market Reach with New Ingram Micro Distribution Relationship

NEW YORK, Dec. 10, 2020 /PRNewswire/ -- Atakama Inc., the data security company that introduced the first Zero Trust file system through multi-factor encryption, announced today a U.S. distribution

Read More
Security

Searching Through Files Without Decrypting? Atakama Makes it Possible

Since the pandemic forced a shift to remote operations, companies have accelerated efforts to move data to the cloud -- presenting attackers with plenty of fresh targets. Two recent examples:

Read More
Security

Understanding the HIPAA Encryption Requirement

In its original form, the Health Insurance Portability and Accountability Act (HIPAA) was intended to protect patient health information (PHI) privacy. Since the law was enacted in 1996 and as

Read More
Cloud Security

Protect Your Data on the Way to the Cloud

Migrating to the cloud offers the promise of flexibility, better security, cost savings, increased collaboration and gaining a competitive edge, but it isn’t without its problems.

Read More
Security

Why You Should Care About the NY DFS Cybersecurity Regulation

In an already highly regulated industry like financial services, adding another compliance requirement should have little effect. However, when the New York Department of Financial Services (NY DFS)

Read More
Security

Special Announcement: Atakama Releases Encrypted File Transfer

Atakama has released its newest feature, Encrypted File Transfer, which allows users to send encrypted files to third parties! Emailing files to third parties is essential for every business. But

Read More
Security

Phishing: Not Just One Kind Of Attack

Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating companies and executives to targeting and duping unsuspecting employees. This useful explainer

Read More