Meet Portal26 at RSA in San Francisco, May 6 – 8

State of Generative AI | Interactive Survey Results

CISOs Guide: 3 Strategies to Maximize Cybersecurity budgets for data security

CISO Guide: 3 Strategies to Maximize Cybersecurity Budgets for Data Security

CISO Guide: 3 Strategies to Maximize Cybersecurity Budgets for Data Security This edition of Portal26’s Data Security Blog is dedicated to optimizing cybersecurity budgets as they relate to securing enterprise data . With the economic forecast being gloomy and waves of budget cuts as well as layoffs, it has become more challenging than ever before […]

CISO Guide: 3 Strategies to Maximize Cybersecurity Budgets for Data Security Read More »

3 Ransomware Defense Strategies And Mistakes To Avoid

3 Ransomware Defense Strategies And Mistakes To Avoid These days not a week goes by without news of fresh ransomware attacks. Everywhere we look, companies are falling victim to ransomware and extortion. Even companies with enormous investments in a wide variety of security technologies do not seem to be immune to these attacks. This blog

3 Ransomware Defense Strategies And Mistakes To Avoid Read More »

Ransomware attack costs (480 × 270 px)

Ransomware Attacks Affect More Than Just Your Wallet

Ransomware Attacks Affect More Than Just Your Wallet Nowadays, ransomware assaults are the biggest cybersecurity threat to date, affecting major businesses all over the globe. It is apparent that no one is immune to these attacks and cybercriminals will target any customer or business from all sectors of society. Because of this, organizations are striving

Ransomware Attacks Affect More Than Just Your Wallet Read More »

Quantum Computers and Encryption (480 × 270 px)

Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption

Can Quantum Computers Break Encryption?  Demystifying the Connection Between Quantum Computing and Encryption With recent news about advances in quantum computing and the potential risk to information security, a lot of people are wondering about the connection between quantum computing and encryption. This article seeks to answer these questions in simple terms and as a

Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption Read More »

Portal26’s Guide To Preventing Data Exfiltration

Portal26’s Guide To Preventing Data Exfiltration In today’s data driven world, data can be considered one of the most valuable assets an enterprise’s possession. A vast majority of security controls deployed in an organization serve to keep its data secure and private and so one could argue that an organization’s security posture can be assessed

Portal26’s Guide To Preventing Data Exfiltration Read More »

Portal26 CEO and Founder Named Female Entrepreneur of the Year & Female Executive of the Year (480 × 270 px)

Portal26 CEO and Founder Named Female Entrepreneur of the Year & Female Executive of the Year

Portal26 CEO and Founder Named Female Entrepreneur of the Year & Female Executive of the Year  Portal26, Inc., the industry’s most advanced data protection and ransomware immunity platform, today announced that CEO and founder Arti Raman was named the TITAN Women In Business Awards’ 2022  Female Entrepreneur of the Year (Business < 5 Years) &

Portal26 CEO and Founder Named Female Entrepreneur of the Year & Female Executive of the Year Read More »

Cyber immunity by tackling data exfiltration (480 × 270 px)

Boost Cyber Immunity in 2023 by Combating Data Exfiltration

Boost Cyber Immunity in 2023 by Combating Data Exfiltration In recent years, the world has become aware of the effects and nature of a far-reaching virus. Biologically, a virus invades the body and causes havoc to infect the host. While this virus that caused the recent pandemic targeted living things, technology is susceptible to a

Boost Cyber Immunity in 2023 by Combating Data Exfiltration Read More »