News & Insights by Atakama

Eliminate the Threat of Exfiltrative Extortive Ransomware

In its initial iteration, ransomware used encryption to lock down a victim’s data and extended the “courtesy” of notifying victims that an exploit has occurred and demanded payment in exchange for

Read More

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data

Multi-factor authentication (MFA) was built on the construct of checking your credentials in a way unique to you with something only you know, something only you have and something only you are. On

Read More
Security

Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats

Ransomware attacks today look a lot different than in the recent past. They have expanded in magnitude, frequency, and severity. Past attacks were much smaller in scope and significantly less

Read More
Encryption

Granular File Encryption Without Passwords

Threshold cryptography exists in obscurity relative to more widely exposed concepts in security: encryption, digital signatures and certificates, for example. Although academic cryptography experts

Read More
Security

The New Normal and New Security Challenges Created by the Work From Home Model

Read More
Security

Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security

Let’s begin with the premise that cybersecurity and information security are not the same thing:

Read More
Security

Render Zero-Day Attacks Useless on Your Network

Without fail, the daily headlines feature an organization suffering a security breach or a software vendor informing the public about vulnerabilities in their product. But perhaps the most

Read More
Security

4 Root Causes of Data Breaches

Recent studies from the Ponemon Institute and IBM have found that the cost of a data breach for enterprises has increased 6.4% to $3.86 million per event. Meanwhile, the average cost of a data breach

Read More
Security

How Doxxing Can Impact Your Organization

Reaching beyond the infosec community, one of the most publicized incidents of the past decade was the 2014 doxxing of Sony Pictures. Ostensibly, the attack was ordered by North Korean leader Kim

Read More
Security

Anatomy of an Attack: An evil twin joins an accounting firm

This is a series designed to illustrate the impact of data breaches on different types of businesses from the perspective of key stakeholders at those businesses. In this first installment of Anatomy

Read More
Encryption

The DFS Encryption Mandate is Here. Are You Ready?

February 15th marked the deadline for all businesses under the jurisdiction of the New York State Department of Financial Services (DFS) to be in compliance with new cybersecurity regulations.

Read More
Regulatory Compliance

New York State's New Cybersecurity & Encryption Requirements

On March 1, 2017, the New York State Department of Financial Services (DFS) made effective its Cybersecurity Requirements for Financial Services Companies (Full PDF: 23 NYCRR Part 500).

Read More