On Tuesday, June 9, at 11 a.m. PDT/2 p.m. EDT/7 p.m. GMT, @eWEEKNews will host its 87th monthly #eWEEKChat. The topic will be "Data Storage, Protection in a Hypersensitive Era." It will be moderated by eWEEK Editor Chris Preimesberger.
Some quick facts:
Topic: #eWEEKchat, June 9: "Data Storage, Protection in a Hypersensitive Era”
Date/time: Tuesday, June 9, 11 a.m. PDT / 2 p.m. EDT / 7 p.m. GMT
Tweetchat handle: Use #eWEEKChat to follow/participate, but it's easier and more efficient to use real-time chat room links.
Tweetchat handle: You can use #eWEEKchat to follow/participate via Twitter itself, but it's easier and more efficient to use the real-time chat room link atCrowdChat. Instructions are on that page; log in at the top right, use your Twitter handle to register, and the chat begins promptly at 11 a.m. PT. The page will come alive at that time with the real-time discussion. You can join in or simply watch the discussion as it is created. Special thanks to John Furrier ofSiliconAngle.com for developing the CrowdChat app.
Our in-chat experts include: Molly Presley, Qumulo Global Marketing; Ryo Koyama, CEO of Remote.it; Eric Bassier, Sr. Director at Quantum Corp.; Nigel Hawthorn, McAfee EMEA; Juan Mojica, NetApp Sr. Manager of Security Product Management; Adrian Moir, Quest Software; Gadi Naor, CTO, Alcideio; Paul Speciale, Scality Software; David Ngo, VP of Metallic; Jim Hammer, Harmony Healthcare IT; Penny Gralewski, Commvault; Alex Sakaguchi, Veritas Software. Check back for late additions.
Chat room real-time link: Use https://www.crowdchat.net/eweekchat. Sign in with your Twitter handle and use #eWEEKchat for the identifier.
Protecting our all-important, sensitive data in an increasingly dangerous world
Data security always seems to be multiple steps behind the bad actors in the world, whose purpose it is in life is to steal, plunder and otherwise fraudulently acquire personal data in order to resell it to the highest bidder on the black market. And what these backroom data brokers do with all of our PII and business information metastasizes into myriad channels of fraudulent activity that hit a percentage of global users every single day.
Ransomware, merely one of these reprehensible strategies, continues to be the fastest-growing type of malware that will get you or your company nailed. Ransomware is a type of malicious malware designed to deny access to a computer system or data until a ransom is paid. Data storage and protection companies such as Veritas, Commvault, NetApp, Quest and many others all have specific tools that can be used to detect--and even predict--how these attacks can happen to an enterprise system.
Then there are tools to make sure important data is stored safely under international and regional security regulations. IBM’s Guardium Analyzer security tool, for one example, specifically helps organizations identify and protect sensitive personal information that might be subject to the European Union's (EU) General Data Protection Regulation (GDPR).
GDPR is all about keeping personal end-user information private, but not all organizations always know where sensitive information is stored within their organization. New-gen tools like Guardium and others are designed to identify and classify personal information that an organization is storing within databases.
An ongoing bad-guy trend involves cryptominers and crypto-related threats as a whole. In fact, cryptominers have taken the world by storm, becoming the leading attack vector used by threat actors starting in 2017 and continuing through 2020, challenging even the ransomware wave. So far, cryptominers have greatly improved their capabilities as well as upgraded their targets array: servers, mobile devices, industrial systems and cloud infrastructure--no one is left behind.
To provide organizations with the best level of protection, security experts must be forever attuned to the ever-changing landscape and the latest threats and attack methods. That leads us to this discussion on #eWEEKchat.
It is imperative that we protect our data wherever it exists: in servers, on our phones, in our laptops, in the cloud, in desktop storage devices, thumb drives and everywhere else. If we don't, our hard work in whatever profession we're in goes right out the window, and the rewards go to thieves.
Here are some seed questions we’ll ask on Tuesday:
- What administrative tools are you using in your IT system to protect data and back it up offsite or in the cloud so that it renders ransomware useless?
- How is your organization providing adequate data privacy protection for your employees, customers, clients and partners?
- How has the COVID-19 pandemic impacted your company's approach to data protection in the first half of 2020?
- What kinds of functions do you wish your own IT system had to add better protection for your business data?
- Are you confident overall in how your company is approaching all these issues? Are you seeing push-back from management about updating and upgrading security processes?
We also will discuss the following topics:
- With so much more PII and valuable business data filling up storage coffers and cloud services, there is much more data to plunder. Also, with more people working from home and using remote apps to connect to work and to cloud services, there is more opportunity for bad actors to intercept and steal stuff. How do we improve our security and data privacy protection to keep up with these trends?
- Companies have become their own remote networks, and far too many of them are unsophisticated in securing these connections. How do we improve education here?
- Encryption is a very important option, but many companies still cannot be bothered or don’t see its value. How can we change this approach?
Join our live discussion Tuesday at 11am Pacific. You’ll to come away with good information to use in the future.
#eWEEKchat Tentative Schedule for 2020*
xJan. 8: Trends in New-Gen Data Security
xFeb. 12: Batch Goes Out the Window: The Dawn of Data Orchestration
xMarch 11: New Trends and Products in New-Gen Health-Care IT
xApril 8: Trends in Collaboration Tools
xMay 12: Trends in New-Gen Mobile Apps, Devices
June 9: Data Storage, Protection in a Hypersensitive Era
July 7: New Advances in Networking
Aug. 11: TBA
Sept. 8: DataOps: The Data Management Platform of the Future?
Oct. 13: IBM, Dell, Oracle, Cisco, both HPs: Are Legacy Companies Still Innovating?
Nov. 10: Hot New Tech for 2021
Dec. 8: Predictions and Wild Guesses for IT in 2021
*all topics subjects to change