Onix Blog

Key insights to drive more business value with cloud

Subscribe
  • DORA The EU regulation shaping the future of financial institutions cybersecurity – Part 1 Thumbnail

    DORA – The EU regulation shaping the future of financial institutions’ cybersecurity

    Financial institutions (FIs) manage a lot of sensitive data, which makes this domain a gold mine for cybercriminals.

    Read more
  • DORA The EU regulation shaping the future of financial institutions cybersecurity – Part 1 Thumbnail

    DORA – The EU regulation shaping the future of financial institutions’ cybersecurity

    Financial institutions (FIs) manage a lot of sensitive data, which makes this domain a gold mine for cybercriminals.

  • The Importance of Ransomware Assessments - Onix

    The importance of ransomware assessments

    The 2024 State of Ransomware report highlights the growing threat of ransomware attacks:

  • Chrome Enterprise Premium: enforcing endpoint security for regulated industries

    There’s little debate about the security challenges faced by highly regulated industries like healthcare, banking, and energy…

  • The Growing Importance of Cybersecurity in the Healthcare Domain

    Enormous costs of healthcare data breaches and how to mitigate them

    A February 2024 cyberattack on Change Healthcare, which accounts for nearly 40% of all…

  • Achieving-Data-Entitlement-Access

    Achieving data entitlement and access

    There’s little doubt that modern organizations value data as paramount to drive their business decisions and market competitiveness. However, poor data quality continues to be their Achilles heel. Every year, data-driven organizations continue to incur high costs due to poor data quality. IBM estimates that the average cost impact of poor data for businesses is… Continue reading Achieving data entitlement and access

  • Extracting-Security-Insights-from-Googles-Community-Security-Analytics-thumbnail.png

    Extracting security insights from Google’s Community Security Analytics

    In response to increasingly sophisticated online threats, many organizations are shifting from product-centric security approaches to modernize their security operations. Introduced in March 2022, Google’s Community Security Analytics (CSA) simplifies security operations through continuous detection and responses. Essentially, CSA is a set of open-source queries used for self-servicing security analytics – that enable you to… Continue reading Extracting security insights from Google’s Community Security Analytics

  • Applying Google’s New Cutting-Edge AI to Augment Workspace Security

    Applying Google’s new cutting-edge AI to augment Workspace security

    The rapid shift to distributed and hybrid work environments has created unprecedented security challenges. Traditional perimeter-based defenses fall short when users and devices live outside the corporate firewall. Organizations require intelligent, adaptive security powered by artificial intelligence to protect data and users everywhere. Google Workspace announced new AI capabilities, offering a comprehensive zero-trust architecture, robust… Continue reading Applying Google’s new cutting-edge AI to augment Workspace security

  • Securing Your Workloads in GCP: A Guide to FedRAMP Compliant Landing Zones

    Securing your workloads in GCP: A guide to FedRAMP Compliant Landing Zones

    In the age of Generative AI, Machine Learning, and powerful language models like Bard and ChatGPT, there is an understandable excitement about the potential these technologies hold for our day-to-day activities. However, as we embrace these advancements, it remains crucial to prioritize the security and compliance of our workloads. Are you and your team familiar… Continue reading Securing your workloads in GCP: A guide to FedRAMP Compliant Landing Zones

  • Cloud Security Concerns

    Five cloud security concerns and how to avoid them

    Organizations are investing in the cloud this year more than ever before, with an estimated cloud spending growth of 21.7% in 2022, reaching a total of $482 billion globally.  With this investment, many businesses are increasing reliance on cloud services and infrastructure, which will require stronger cloud security and governance. Below we’ll discuss the top five cloud… Continue reading Five cloud security concerns and how to avoid them

  • Cloud Security Framework

    Cloud Security Framework: avoid financial and reputational damage

    The cloud you’ll be known by You hardly ever notice it, but your valuable company data constantly moves to more places than ever—from your desktop to your phone to a tablet to your watch to any device in your life. Amazing for productivity, but possibly devastating if you don’t have a repeatable, end-to-end approach to manage and… Continue reading Cloud Security Framework: avoid financial and reputational damage

  • HIPAA Compliance in the Cloud: Google’s Cloud Security Foundations and Assured Workloads

    HIPAA compliance in the cloud: Google’s Cloud Security Foundations and Assured Workloads

    As healthcare providers continue to embrace digital transformation, they must ensure compliance with regulatory requirements such as the Health Insurance Portability and Accountability Act (HIPAA). The challenges faced by healthcare providers when it comes to managing sensitive workloads in a secure and compliant environment include compliance challenges, security challenges, and operational challenges. The failure to… Continue reading HIPAA compliance in the cloud: Google’s Cloud Security Foundations and Assured Workloads

  • An-All-Fronts-Approach-to-Deeper-Security-copy

    An all-fronts approach to deeper security

    The crisis of 2020 that changed the way we work also revealed a number of discoveries both about the…

  • Cloud-Security-Best-Practices-to-Safeguard-Your-Organization-Thamnail.jpg

    Cloud security best practices to safeguard your organization

    While convenient, common rapid cloud adoptions can overshadow cloud security and governance…

  • How-Data-Solves-Real-Life-Healthcare-Problems-Thamnail.jpg

    How data solves real-life healthcare problems

    Data is at the core of everything — and healthcare is no exception. In fact, it’s even more important due to the…

  • How-a-Zero-Trust-Security-Model-Can-Improve-Your-Organization

    How a Zero Trust Security Model can improve your organization

    As remote work continues to become increasingly popular, employees are creating and accessing sensitive…

  • Google-Workspace-and-the-Advantages-of-Cloud-Security

    Google Workspace and the advantages of cloud security

    We’re only a few months into the year and it already looks like breach fatigue has taken hold. The latest breach…