Portal26 named GenAI Visibility/Governance/Security Leader in Houlihan Lokey Cybersecurity Update 

Securing PII

Securing elasticsearch

Keeping Elasticsearch data secure from attacks and exposure

Keeping Elasticsearch data secure from attacks and exposure In the last few years enterprises have seen an unprecedented amount of data lost from vulnerable Elasticsearch clusters. Tens of billions of records of highly sensitive data across financial services, healthcare, high-tech, retail, and hospitality segments have been exposed or stolen. A simple web search for Elasticsearch […]

Keeping Elasticsearch data secure from attacks and exposure Read More »

BlackCat Ransomware attacks - prevention - Portal26

Protect your organization from BlackCat Ransomware attacks

Ransomware Prevention: Protect your organization from BlackCat Ransomware attacks Where there is value for organizations online, there will be a cybercriminal ready with a ransomware attack to exploit it.  Since they first emerged in December of 2021, BlackCat Ransomware has become another example of a ring of cybercriminals who practice the model of Ransomware-as-a-Service (RaaS)

Protect your organization from BlackCat Ransomware attacks Read More »

Protection against cyber threats

Be Prepared to Neutralize Cyberattacks When – Not If – They Happen

Be Prepared to Neutralize Cyberattacks When – Not If – They Happen Businesses today are under the constant threat of cyberattacks from ransomware and extortion. In fact, 68% of business leaders feel their risk of a cyberattack is increasing, according to Accenture. For years, enterprise-level organizations have relied on data protection platforms focusing solely on

Be Prepared to Neutralize Cyberattacks When – Not If – They Happen Read More »

Data Exfiltration

Data Exfiltration And How To Protect Your Data

Traditional Data Security Tools Fail at 60% Rate, Become Immune to Data Exfiltration with Portal26 Portal26’s ‘State of Data Exfiltration & Extortion Report’ shows that organizations may be less protected from security threats than they believe. Ransomware is becoming more and more about extortion, and current dataloss prevention tactics aren’t measuring up to the challenge.

Data Exfiltration And How To Protect Your Data Read More »

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch We recently learnt that a number of our prospects were running their B2B SaaS platform on top of Elasticsearch. Nearly all of them asked if we also support AWS OpenSearch. Many of them are running older versions of Elasticsearch and are evaluating if they should

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch Read More »

OpenSearch Partner Highlight: How Portal26 Plugin can further secure…

OpenSearch Security: How Portal26 Plugin can further secure your OpenSearch Deployment Over the past few years there have been numerous security breaches reported in the news. These types of incidents are top of mind as people want to ensure the software and services they build are secure. OpenSearch provides an out-of-the-box security plugin so that developers can

OpenSearch Partner Highlight: How Portal26 Plugin can further secure… Read More »

Normalizing Outliers in Cybersecurity – Ransomware Edition

Ransomware Defense: Normalizing Outliers in Cybersecurity – Ransomware Edition Last week, I wrote an article titled “Black Swan in Data Security”. The primary point I made is that most IT projects fail to consider even mild outlier events when it comes to security (such as compromised passwords or breach). However what used to be an

Normalizing Outliers in Cybersecurity – Ransomware Edition Read More »

Ensuring Secure and Private Defaults for Sensitive Data in…

You could simply protect the whole thing. By default. All the time. The data itself would be “secure by default”. Interested in learning more about how Portal26’s data-in-use protection can help secure your sensitive data? Get started today with a demo. Related Resources Securing sensitive data – ensuring secure and private defaults for sensitive data

Ensuring Secure and Private Defaults for Sensitive Data in… Read More »