Indian IT Leaders Identify Security Gap in Data Policies

A recent study by Rubrik, a US-based data security firm, has bare concerning reality within the Indian IT sector: an alarming 49% of IT leaders feel that security remains a glaring omission within their organization's data policies.
This discovery sheds light on a crucial aspect of data management that has to be addressed right now and strategically.
In essence, this finding implies that a substantial portion of IT leaders in Indian organizations perceive a notable break in their data policies concerning security measures.
According to the report, an emerged on a global scale: approximately fifty percent of organizations surveyed across the world encountered the loss of sensitive data within the past year.
These figures undoubtedly contain unique information, such as Personally Identifying Information, economic data, or confidential company facts, which makes their disclosure a serious matter.
It emphasizes how often data breaches occur and how highly vulnerable businesses are in a variety of industries and locations.
Data loss has significant ramifications, impacting organizations on multiple fronts.
Customers' confidence in an organization's ability to secure their data is ruined by breaches.
Data breaches damage a logo's recognition, affecting the public's opinion of a company's dependability and integrity.
Regulatory non-compliance, which may result in critical penalties often results in data breaches.
The rapid pace of technological progress generates vulnerabilities that surpass the adaptability of current security measures.
Making sure steady cloud infrastructures and robust encryption methodologies across data transmission and storage is vital.
Embracing encryption practices throughout the data lifecycle is pivotal for safeguarding sensitive information in today's threat landscape.
Collaboration with regulatory bodies plays a crucial role in advocating for robust data protection laws and regulations.
Engaging actively in the development of comprehensive legal frameworks is vital to ensure data security and privacy.
Strict adherence to existing and evolving data protection laws and regulatory standards is imperative, holding organizations accountable for maintaining and implementing robust security measures across the board.
Rubrik's study serves as a wake-up call for Indian IT leaders, shedding light on the glaring omission of security within data policies.
The global trend of data loss further emphasizes the magnitude of the challenge, with billions of sensitive records compromised worldwide.
Addressing the root causes, such as outdated frameworks, inadequate investments, and the rapid pace of technological advancements, is imperative to protect data policies and cybersecurity measures.
Rubrik's leaders stress the importance of immediate action, advocating for clearer visibility into data, robust cyber resilience plans, and fostering a culture of cybersecurity awareness.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 29 Dec 2023 08:13:05 +0000


Cyber News related to Indian IT Leaders Identify Security Gap in Data Policies

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
8 months ago Aws.amazon.com
Indian IT Leaders Identify Security Gap in Data Policies - A recent study by Rubrik, a US-based data security firm, has bare concerning reality within the Indian IT sector: an alarming 49% of IT leaders feel that security remains a glaring omission within their organization's data policies. This discovery ...
1 year ago Securityboulevard.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
1 year ago Securityzap.com
Create Highly Secure Applications in Mule 4 - Accessibility Control/Access Management Use Anypoint Access Management to create your Anypoint Platform account or configure a federated External Identity. Environment Management Anypoint Platform enables you to create and manage separate deployment ...
1 year ago Feeds.dzone.com
How an Indian startup hacked the world - Reuters previously named Appin in a story about Indian cyber mercenaries published last year. This report paints the clearest picture yet of how Appin operated, detailing the world-spanning extent of its business, and international law enforcement's ...
1 year ago Reuters.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
2 months ago Cybersecuritynews.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
Why Security Leaders Are Turning to AI for Threat Detection - With cyber attacks growing in complexity, AI offers the ability to analyze vast amounts of data, identify subtle patterns, and detect anomalies in real-time capabilities that traditional security approaches simply cannot match. Security leaders ...
2 months ago Cybersecuritynews.com
EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group - For the last several months, there has emerged a campaign of bullying and censorship seeking to wipe out stories about the mercenary hacking campaigns of a less well-known company, Appin Technology, in general, and the company's cofounder, Rajat ...
1 year ago Eff.org
Automating Incident Response - CISO's Efficiency Guide - For technical leaders, implementing effective incident response automation represents an opportunity to transform security operations, dramatically reduce mean time to resolution (MTTR), and enable teams to focus on high-value activities rather than ...
1 month ago Cybersecuritynews.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
8 months ago Cyberdefensemagazine.com
The Psychology of Social Engineering - What Security Leaders Should Know - Creating a security culture that addresses the psychological dimensions of social engineering requires a fundamental shift in how security leaders approach human vulnerability. When examining security incidents, leaders often focus on which technical ...
1 month ago Cybersecuritynews.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Why 78% of Security Leaders Are Rethinking Their Entire Cyber Strategy in 2025 - By building security strategies that acknowledge the realities of today’s threat landscape while aligning with business objectives, they’re positioning their organizations to thrive despite the challenging security environment of 2025. ...
2 months ago Cybersecuritynews.com
Cybersecurity is a Team Sport - Good security hygiene needs to be a fundamental part of company culture, and leadership should make it clear that proper security practices are part of achieving business objectives. Infusing security and operational resilience throughout the ...
1 year ago Darkreading.com
How to Integrate Security into Agile Dev Teams - By demonstrating persistent attention to security culture, practices, and outcomes, leaders signal that security integration is not a temporary initiative but a fundamental and permanent aspect of how agile teams operate and deliver value to ...
2 months ago Cybersecuritynews.com
The Psychology of Social Engineering - What Security Leaders Should Know - Creating psychological resilience against social engineering demands that security leaders adopt a fundamentally different approach to human security aspects. Effective security leaders understand that building true organizational resilience requires ...
1 month ago Cybersecuritynews.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
1 year ago Feeds.dzone.com
2024 brings changes in data security strategies - 2024 will be a revolutionary year for the data security landscape as Data Security Posture Management technology rapidly evolves to keep pace with the colossal amount of data being created, stored and shared within organizations and across business ...
1 year ago Helpnetsecurity.com
Week in review: PoC for Splunk Enterprise RCE flaw released, scope of Okta breach widens - Vulnerability disclosure: Legal risks and ethical considerations for researchersIn this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in ...
1 year ago Helpnetsecurity.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
Tech Security Year in Review - In this Tech Security Year in Review for 2023, let's look into the top data breaches of the past year. Each factor contributes to the growing threatscape, demanding a proactive and adaptable cybersecurity approach to safeguard your organization ...
1 year ago Securityboulevard.com
Security takes a backseat as CTOs and CIOs lean towards AI in 2024 - 35% of IT leaders will prioritize reducing time and resources on repetitive tasks in 2024, as 59% claim IT support is where the majority of their time is spent, according to Exclaimer. The survey results show that 2023's biggest challenges for IT ...
1 year ago Helpnetsecurity.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
1 year ago Helpnetsecurity.com
Zero Trust 2025 - Emerging Trends Every Security Leader Needs to Know - Forward-thinking organizations are embedding Zero Trust principles into broader business strategies rather than treating them as isolated security initiatives. Security leaders must champion this integrated approach to Zero Trust implementation to ...
2 months ago Cybersecuritynews.com