is now

State of Generative AI | Interactive Survey Results

Cyber Immunity

3 Ransomware Defense Strategies And Mistakes To Avoid

3 Ransomware Defense Strategies And Mistakes To Avoid These days not a week goes by without news of fresh ransomware attacks. Everywhere we look, companies are falling victim to ransomware and extortion. Even companies with enormous investments in a wide variety of security technologies do not seem to be immune to these attacks. This blog […]

3 Ransomware Defense Strategies And Mistakes To Avoid Read More »

Portal26’s Guide To Preventing Data Exfiltration

Portal26’s Guide To Preventing Data Exfiltration In today’s data driven world, data can be considered one of the most valuable assets an enterprise’s possession. A vast majority of security controls deployed in an organization serve to keep its data secure and private and so one could argue that an organization’s security posture can be assessed

Portal26’s Guide To Preventing Data Exfiltration Read More »

Cyber immunity by tackling data exfiltration (480 × 270 px)

Boost Cyber Immunity in 2023 by Combating Data Exfiltration

Boost Cyber Immunity in 2023 by Combating Data Exfiltration In recent years, the world has become aware of the effects and nature of a far-reaching virus. Biologically, a virus invades the body and causes havoc to infect the host. While this virus that caused the recent pandemic targeted living things, technology is susceptible to a

Boost Cyber Immunity in 2023 by Combating Data Exfiltration Read More »

How to protect against the Daixin Team Ransomware Group

How to protect against the Daixin Team Ransomware Group Ransomware attacks are common and becoming more creative. However, as attackers evolve, so do their decisions of targets and methodology.  As of October 2022, the FBI’s Internet Crime Complaint Center (IC3) holds victim reports across all 16 critical infrastructures, but the healthcare and public health sector

How to protect against the Daixin Team Ransomware Group Read More »

Need top-of-the-line defense? Turn to Portal26 Protect

Need top-of-the-line ransomware protection? Turn to Portal26 Protect When using data-driven insights to grow business operations, significant security dangers come with the territory. Due to weak cybersecurity, many firms are exposed to cybercrime and security breaches as ransomware and extortion are becoming routine. Cybersecurity implementation is crucial for companies with Security Operations Centers, and Portal26’s

Need top-of-the-line defense? Turn to Portal26 Protect Read More »

Data States Security Experts Unhappy With Traditional Tokenization

Data States Security Experts Unhappy With Traditional Tokenization

Data States Security Experts Unhappy With Traditional Tokenization Cybersecurity experts may look to Portal26 for all the benefits of traditional tokenization and none of the tradeoffs.   Portal26’s 2022 State of Enterprise Tokenization Survey shows that the vast majority of cybersecurity experts are dissatisfied with their current tokenization tools. In fact, despite spending 1 million dollars

Data States Security Experts Unhappy With Traditional Tokenization Read More »

Data Exfiltration

Data Exfiltration And How To Protect Your Data

Traditional Data Security Tools Fail at 60% Rate, Become Immune to Data Exfiltration with Portal26 Portal26’s ‘State of Data Exfiltration & Extortion Report’ shows that organizations may be less protected from security threats than they believe. Ransomware is becoming more and more about extortion, and current dataloss prevention tactics aren’t measuring up to the challenge.

Data Exfiltration And How To Protect Your Data Read More »

Assumed Breach posture: how does encryption of data-in-use help?

Assumed Breach posture: how does encryption of data-in-use help? When unauthorized individuals extract restricted and sensitive information from protected systems, the event is known as a data breach. Such incidents incur major financial consequences on the victims. This necessitates a set of standard security measures to be taken. . How can we predict such possibilities

Assumed Breach posture: how does encryption of data-in-use help? Read More »

Normalizing Outliers in Cybersecurity – Ransomware Edition

Ransomware Defense: Normalizing Outliers in Cybersecurity – Ransomware Edition Last week, I wrote an article titled “Black Swan in Data Security”. The primary point I made is that most IT projects fail to consider even mild outlier events when it comes to security (such as compromised passwords or breach). However what used to be an

Normalizing Outliers in Cybersecurity – Ransomware Edition Read More »