This blog is the sixth in our series about a new study, Cloud Data Security by TechTarget’s Enterprise Strategy Group (ESG). The study examined challenges of securing cloud data among 387 IT, cybersecurity, and DevOps professionals who evaluate, purchase, test,...
Securing sensitive data is a major challenge for security teams because of data proliferation. Data proliferation is driven by adoption of a variety of cloud workloads, explosion in access privileges, and other reasons. To help with this challenge, the Normalyze cloud...
This blog is fifth in our series about a new study, Cloud Data Security by TechTarget’s Enterprise Strategy Group (ESG). The study examined challenges of securing cloud data among 387 IT, cybersecurity, and DevOps professionals who evaluate, purchase, test, deploy,...
Security professionals are used to vendors tooting company horns about their products and services. It’s part of what you expect vendors to do! But one event stands above all others in showing technical leadership: earning the grant of a patent from the United States...
This blog is the fourth in our series about a new study, Cloud Data Security by TechTarget’s Enterprise Strategy Group (ESG). If you’re just jumping into this series, feel free to dial back to the first post that introduces this study. To summarize, this initiative...
Data access governance is one of the core elements of holistic data security. Without a full understanding of who (users) & what (cloud resources) has access to data stores, especially those that contain sensitive data, any assessment of data security posture is...