News & Insights by Atakama

Security

Searching Through Files Without Decrypting? Atakama Makes it Possible

Since the pandemic forced a shift to remote operations, companies have accelerated efforts to move data to the cloud -- presenting attackers with plenty of fresh targets. Two recent examples:

Read More
Security

Understanding the HIPAA Encryption Requirement

In its original form, the Health Insurance Portability and Accountability Act (HIPAA) was intended to protect patient health information (PHI) privacy. Since the law was enacted in 1996 and as

Read More
Cloud Security

Protect Your Data on the Way to the Cloud

Migrating to the cloud offers the promise of flexibility, better security, cost savings, increased collaboration and gaining a competitive edge, but it isn’t without its problems.

Read More
Security

Why You Should Care About the NY DFS Cybersecurity Regulation

In an already highly regulated industry like financial services, adding another compliance requirement should have little effect. However, when the New York Department of Financial Services (NY DFS)

Read More
Security

Special Announcement: Atakama Releases Encrypted File Transfer

Atakama has released its newest feature, Encrypted File Transfer, which allows users to send encrypted files to third parties! Emailing files to third parties is essential for every business. But

Read More
Security

Phishing: Not Just One Kind Of Attack

Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating companies and executives to targeting and duping unsuspecting employees. This useful explainer

Read More
Cloud Security

How to Eliminate Your Company's Cloud Security Exposure Risks

Data breaches, insider threats, inadequate cloud security, and misconfiguration represent just several ways in which network intrusions occur. CISOs and IT professionals work diligently to prevent

Read More

Eliminate the Threat of Exfiltrative Extortive Ransomware

In its initial iteration, ransomware used encryption to lock down a victim’s data and extended the “courtesy” of notifying victims that an exploit has occurred and demanded payment in exchange for

Read More

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data

Multi-factor authentication (MFA) was built on the construct of checking your credentials in a way unique to you with something only you know, something only you have and something only you are. On

Read More
Security

Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats

Ransomware attacks today look a lot different than in the recent past. They have expanded in magnitude, frequency, and severity. Past attacks were much smaller in scope and significantly less

Read More
Encryption

Granular File Encryption Without Passwords

Threshold cryptography exists in obscurity relative to more widely exposed concepts in security: encryption, digital signatures and certificates, for example. Although academic cryptography experts

Read More
Security

The New Normal and New Security Challenges Created by the Work From Home Model

Read More