Portal26 selected as a finalist for 2024 AI Trailblazer award

Transform Your Secure Web Gateway into a Powerful GenAI Governance and Security Platform

BlackCat Ransomware attacks - prevention - Portal26

Protect your organization from BlackCat Ransomware attacks

Ransomware Prevention: Protect your organization from BlackCat Ransomware attacks Where there is value for organizations online, there will be a cybercriminal ready with a ransomware attack to exploit it.  Since they first emerged in December of 2021, BlackCat Ransomware has become another example of a ring of cybercriminals who practice the model of Ransomware-as-a-Service (RaaS) […]

Protect your organization from BlackCat Ransomware attacks Read More »

Data States Security Experts Unhappy With Traditional Tokenization

Data States Security Experts Unhappy With Traditional Tokenization

Data States Security Experts Unhappy With Traditional Tokenization Cybersecurity experts may look to Portal26 for all the benefits of traditional tokenization and none of the tradeoffs.   Portal26’s 2022 State of Enterprise Tokenization Survey shows that the vast majority of cybersecurity experts are dissatisfied with their current tokenization tools. In fact, despite spending 1 million dollars

Data States Security Experts Unhappy With Traditional Tokenization Read More »

Protection against cyber threats

Be Prepared to Neutralize Cyberattacks When – Not If – They Happen

Be Prepared to Neutralize Cyberattacks When – Not If – They Happen Businesses today are under the constant threat of cyberattacks from ransomware and extortion. In fact, 68% of business leaders feel their risk of a cyberattack is increasing, according to Accenture. For years, enterprise-level organizations have relied on data protection platforms focusing solely on

Be Prepared to Neutralize Cyberattacks When – Not If – They Happen Read More »

Data Exfiltration

Data Exfiltration And How To Protect Your Data

Essential Data Protection Strategies: How to protect against Data Exfiltration Portal26’s ‘State of Data Exfiltration & Extortion Report’ shows that organizations may be less protected from security threats than they believe. Ransomware is becoming more and more about extortion, and current dataloss prevention tactics aren’t measuring up to the challenge. Cybercriminals seeking to breach and

Data Exfiltration And How To Protect Your Data Read More »

A New Approach to Privacy-Preserving Encryption

GUEST BLOG For years, I’d always assumed that privacy-preserving encryption was equivalent to homomorphic encryption. You will recall that with homomorphic encryption, arithmetic can be done on encrypted data to produce the same value as would emerge for addition of the cleartext. This method has received so much investment that it’s not hard to conclude that it’s required

A New Approach to Privacy-Preserving Encryption Read More »

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch We recently learnt that a number of our prospects were running their B2B SaaS platform on top of Elasticsearch. Nearly all of them asked if we also support AWS OpenSearch. Many of them are running older versions of Elasticsearch and are evaluating if they should

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch Read More »

Assumed Breach posture: how does encryption of data-in-use help?

Assumed Breach posture: how does encryption of data-in-use help? When unauthorized individuals extract restricted and sensitive information from protected systems, the event is known as a data breach. Such incidents incur major financial consequences on the victims. This necessitates a set of standard security measures to be taken. . How can we predict such possibilities

Assumed Breach posture: how does encryption of data-in-use help? Read More »

Why should you watch out for SOC Data: The Threat of Ransomware

SOC Security: why should you watch out for SOC Data – The Threat of Ransomware With the use of data-driven insights to efficiently develop business operations, significant security risks come with the territory. Given the import of the Security Operations Center, cyber threats and attacks need to be prevented. Cybercrime and security breaches are already

Why should you watch out for SOC Data: The Threat of Ransomware Read More »

OpenSearch Partner Highlight: How Portal26 Plugin can further secure…

OpenSearch Security: How Portal26 Plugin can further secure your OpenSearch Deployment Over the past few years there have been numerous security breaches reported in the news. These types of incidents are top of mind as people want to ensure the software and services they build are secure. OpenSearch provides an out-of-the-box security plugin so that developers can

OpenSearch Partner Highlight: How Portal26 Plugin can further secure… Read More »