FedRAMP Authorized vs. FedRAMP Equivalent: Why One Is Definitely Better Than the Other
Virtru
by Mike Morper
1d ago
For defense contractors handling sensitive government data, ensuring robust cybersecurity protections and regulatory compliance is paramount. However, navigating the complex web of standards and data security requirements can take time and effort. Two critical frameworks that demand attention are DFARS 7012 and CMMC 2.0, both essential for companies seeking to work with the U.S. Department of Defense (DoD ..read more
Visit website
VCPEIT 2024: A Unique Approach to Data Centric Security
Virtru
by Matt Howard
1d ago
I’ll be in Nashville next week representing Virtru as a sponsoring vendor at the annual Venture Capital Private Equity Information Technology (VCPEIT) conference. Having seen many different conference formats throughout my career in software, I’ve never seen anything quite like VCPEIT. Why is it different from most conferences? Because it’s truly intimate, uniquely inclusive of sponsors, and provides attendees the opportunity to “go deep” and “get hands-on” with real-world technology solutions ..read more
Visit website
Cyera Raises $300M at $1.4B Valuation: This Week’s Sign That Data Security is Hot!
Virtru
by Matt Howard
4d ago
Last week, data security provider Cyera announced it raised $300 million in funding at a $1.4 billion valuation, signaling yet again that data-centric security represents an attractive and fast growing sub-category within the broader cyber security market ..read more
Visit website
The Microsoft Monoculture: A Single Point of Failure
Virtru
by Matt Sack
6d ago
We’re currently living in a nightmare. One created by the US government's overreliance on Microsoft products and services. And it’s time to wake up ..read more
Visit website
AI in Google Cloud: Infrastructure, Apps, and the Importance of Data-Centric Security
Virtru
by Matt Howard
1w ago
Wow! I am exhausted. I just got back from three days at Google Cloud Next 2024, and I wanted to take a few minutes and share some high-level observations ..read more
Visit website
Make Data Tagging Easier with AI-Powered Labeling in Google Workspace
Virtru
by Editorial Team
1w ago
Google has just announced an exciting application of AI in Google Workspace: AI-powered data tagging, which uses Gemini to apply custom labels to files stored in Google Drive. With this newly announced add-on, Google Workspace admins can leverage AI to categorize sensitive data based on Google Drive labels.  ..read more
Visit website
Data Protection: What It Is and How to Create an Effective Strategy
Virtru
by Editorial Team
2w ago
One of your primary goals should be protecting your company’s data. It is not just about avoiding data breach penalties and fines — it’s about protecting your company’s proprietary information, enabling effective data sharing and providing the privacy and security your customers deserve. The General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the U.S. are some of the world's primary consumer privacy regulations, and more than a dozen U.S. states have pending or passed data privacy or protection legislation. If you're in a regulated ..read more
Visit website
Rubrik IPO Shines Light on Defensive Security, But the Future Demands Offensive Data Controls
Virtru
by
2w ago
Rubrik, a data security posture management (DSPM) provider, has officially filed to go public, effectively breaking the cybersecurity IPO freeze that has maintained for several years.  ..read more
Visit website
The Endlessly Versatile TDF
Virtru
by Editorial Team
2w ago
The Trusted Data format was born in the federal government: Virtru’s co-founder and CTO, Will Ackerly, invented the open standard while working at the National Security Administration (NSA). When Will and his brother, John Ackerly, co-founded Virtru in 2012, their mission was to bring the military-grade data security of the Trusted Data Format (TDF) to the world.  ..read more
Visit website
How S/MIME Works for Encrypted Email
Virtru
by Megan Leader
2w ago
If you want to encrypt emails and attachments, you have several options available to you, ranging from simple to complex. So, how should technology buyers choose the best email encryption software for their organizations? The answer to that question depends on your organization’s data-sharing workflows and requirements ..read more
Visit website

Follow Virtru on FeedSpot

Continue with Google
Continue with Apple
OR