Protecting sensitive data has become a priority for many organizations, especially as they see the associated costs of a data breach. However, the payment card industry has taken a strategy of building protection directly into the data itself from the…
Based on a recent threat intelligence analysis published by Mandiant, a cybersecurity arm of Google, 70% of exploited vulnerabilities disclosed in 2023 were zero-days. That means the threat actors exploited such vulnerabilities before the software vendors and their customers knew…
In the ongoing quest to protect our businesses from the threat of data breaches, there is an ocean of alternatives that attempt to solve the problem in a variety of techniques leveraging perimeter security, host/system security, application security, and data…
What Happened Per the data breach report submitted to the Office of the Maine Attorney General, on September 2, 2024, Lowe’s discovered that an unauthorized third-party obtained a limited number of employees’ Workday login information (username and password) and gained…
OnData is proud to announce that our patent application on data encryption and access management technology has been approved by the United States Patent and Trademark Office (USPTO)! As data repositories and security products only provide siloed security and privacy…
We are excited to announce the latest updates to the OnData Platform which are designed to make easier than ever to protect your organization’s sensitive data (PII, PHI, etc.): Lastly, we would also like to announce that the patent for OnData’s Runtime Encryption technology…
Organizations are struggling with inadequate IT budget while the threats of cybersecurity incidents and data breaches are becoming increasingly prominent. Investment in security appears to be never adequate. Business leaders ask how much more they should invest in security. To…
With OnData’s proprietary Runtime Encryption technology, the answer is YES! By encrypting confidential and sensitive data at ALL times, not just data in-transit and data at-rest, OnData ensures that the bad actors don’t gain access to your confidential and sensitive data, such as PII, HIPAA, CJIS, and…
Threats to data security come in many forms, from ransomware attacks to insider threats, or even accidental misuse. Most entities think that the best way to prevent compromise of confidential and regulated data such as PII, HIPAA, and FERPA data…
Creating business intelligence out of data resources has become both a key strategy for most organizations as well as a major challenge as organizations struggle to find a way to protect confidential and regulated data that are used to build…