CINXE.COM

Normalyze to be purchased by Proofpoint | SC Media

<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="@SCMagazine"/><meta property="og:site_name" content="SC Media"/><title>Normalyze to be purchased by Proofpoint | SC Media</title><meta name="robots" content="index,follow"/><meta name="description" content="Such an acquisition would facilitate the integration of Normalyze&#x27;s DSPM technology into Proofpoint&#x27;s cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts. "/><meta property="og:title" content="Normalyze to be purchased by Proofpoint"/><meta property="og:description" content="Such an acquisition would facilitate the integration of Normalyze&#x27;s DSPM technology into Proofpoint&#x27;s cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts. "/><meta property="og:url" content="https://www.scworld.com/brief/normalyze-to-be-purchased-by-proofpoint"/><meta property="og:type" content="article"/><meta property="article:published_time" content="2024-10-30T09:16:00.000America/New_York"/><meta property="article:modified_time" content="2024-10-30T09:20:00.000America/New_York"/><meta property="article:author" content="SC Staff"/><meta property="article:tag" content="data-security"/><meta property="og:image" content="https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg"/><meta property="og:image:alt" content="Cybersecurity analyst evaluating cybersecurity data trends, Threat assessment and computing risk metrics for cybersecurity enhancement goals and risk mitigation, Approach for safeguarding digital."/><meta property="og:image:secure_url" content="https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg"/><meta property="og:image:width" content="2560"/><meta property="og:image:height" content="960"/><meta property="og:locale" content="en_US"/><link rel="canonical" href="https://www.scworld.com/brief/normalyze-to-be-purchased-by-proofpoint"/><script type="application/ld+json">{"@type":"PostalAddress","@id":"https://cyberriskalliance.com#postalAddress","addressCountry":"US","addressRegion":"NY","postalCode":"10017","streetAddress":"400 Madison Ave","@context":"https://www.schema.org"}</script><script type="application/ld+json">{"@type":"Organization","@id":"https://cyberriskalliance.com#organization","name":"CyberRisk Alliance","url":"https://cyberriskalliance.com","legalName":"CyberRisk Alliance LLC","address":{"@id":"https://cyberriskalliance.com#postalAddress"},"contactPoint":[{"@type":"ContactPoint","contactType":"Sales and sponsorships","email":"sales@cyberriskalliance.com"}],"@context":"https://www.schema.org"}</script><script type="application/ld+json">{"@type":"Organization","@id":"https://https://www.scworld.com#Organization","name":"SC Media","alternateName":["SC Magazine","SC Events"],"address":{"@id":"https://cyberriskalliance.com#postalAddress"},"additionalType":"NewsMediaOrganization","description":"The essential resource for independent news analysis, forward-looking features, product reviews, events, and professional recognition programs. Sharing insight and guidance in partnership with, and for, top-level information security executives and their technical teams.","slogan":"The latest in-depth, unbiased news, analysis and perspective to keep cybersecurity professionals informed, educated and enlightened about the market.","url":"https://www.scworld.com","parentOrganization":{"@id":"https://cyberriskalliance.com#organization"},"memberOf":{"@id":"https://cyberriskalliance.com#organization"},"brand":[{"@type":"Brand","name":"SC Awards","alternateName":["Excellence Awards","Leadership Awards","Trust Awards"],"url":"https://https://www.scworld.com/sc-awards","description":"Honoring the best in cybersecurity, the SC Awards recognize the people, products and companies that are forging the industry鈥檚 future and advancing the cause of safe and secure commerce and communications."},{"@type":"Brand","name":"Women in IT Security","url":"https://https://www.scworld.com/women-in-it-security","description":"Celebrating significant and consequential contributions to the field and community, the SC Media Women in IT Security program honors leaders who have faced down the security challenges, shaped the industry, and made a positive impact on the advancement of cybersecurity in government or the private sector."}],"@context":"https://www.schema.org"}</script><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":0,"item":{"@id":"https://www.scworld.com/","name":"SC Media"}},{"@type":"ListItem","position":1,"item":{"@id":"https://www.scworld.com/topic/data-security","name":"Data Security"}},{"@type":"ListItem","position":2,"item":{"@id":"https://www.scworld.com/brief/normalyze-to-be-purchased-by-proofpoint","name":"Normalyze to be purchased by Proofpoint"}}]}</script><script type="application/ld+json">{"@context":"https://schema.org","@type":"NewsArticle","description":"Such an acquisition would facilitate the integration of Normalyze&apos;s DSPM technology into Proofpoint&apos;s cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts.\n","keywords":"data-security","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.scworld.com/brief/normalyze-to-be-purchased-by-proofpoint"},"headline":"Normalyze to be purchased by Proofpoint","image":["https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg"],"articleSection":"data-security","dateCreated":"2024-10-30T09:16:00.000America/New_York","datePublished":"2024-10-30T09:16:00.000America/New_York","dateModified":"2024-10-30T09:20:00.000America/New_York","author":[{"@type":"Person","name":"SC Staff","url":"https://www.scworld.com/contributor/sc-staff"}],"publisher":{"@type":"Organization","name":"SC Media","logo":{"@type":"ImageObject","url":"https://www.scworld.com/images/sc-logo.png"}},"articleBody":"Such an acquisition would facilitate the integration of Normalyze&apos;s DSPM technology into Proofpoint&apos;s cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts.\n"}</script><meta name="twitter:label2" content="Est. reading time"/><meta name="twitter:data2" content="1 Minute"/><link rel="preload" as="image" imageSrcSet="https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 1920w" imageSizes="(max-width: 992px) 96vw,(max-width: 1400px) 60vw,744px" fetchpriority="high"/><meta name="next-head-count" content="31"/><link rel="manifest" href="/manifest.json"/><meta name="theme-color" content="#ee1c25"/><link rel="shortcut icon" href="/favicon.ico" type="image/x-icon"/><link rel="apple-touch-icon" sizes="57x57" href="/images/logo/icons/apple-touch-icon-57x57.png"/><link rel="apple-touch-icon" sizes="72x72" href="/images/logo/icons/apple-touch-icon-72x72.png"/><link rel="apple-touch-icon" sizes="76x76" href="/images/logo/icons/apple-touch-icon-76x76.png"/><link rel="apple-touch-icon" sizes="114x114" href="/images/logo/icons/apple-touch-icon-114x114.png"/><link rel="apple-touch-icon" sizes="120x120" href="/images/logo/icons/apple-touch-icon-120x120.png"/><link rel="apple-touch-icon" sizes="144x144" href="/images/logo/icons/apple-touch-icon-144x144.png"/><link rel="apple-touch-icon" sizes="152x152" href="/images/logo/icons/apple-touch-icon-152x152.png"/><link rel="apple-touch-icon" sizes="180x180" href="/images/logo/icons/apple-touch-icon-180x180.png"/><link rel="apple-touch-icon" href="/images/logo/icons/apple-touch-icon.png"/><link rel="preconnect" href="//lytics.cyberriskalliance.com"/><link rel="preconnect" href="//securepubads.g.doubleclick.net"/><link rel="preconnect" href="https://api.cyberriskalliance.com"/><link rel="preconnect" href="https://image-optimizer.cyberriskalliance.com"/><link rel="dns-prefetch" href="//ml314.com"/><link rel="dns-prefetch" href="//snap.licdn.com"/><link rel="preload" href="/_next/static/media/61ff65d0201baa35-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/9919cdaa7472f3f1-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/7c7db451c1a82f61-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/2744aa005c8cf586-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/46b92c15a48f3318-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/7f5a4bbe7ec7be95-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/045832894acda0e9-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/120a5a1920781bd0-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/da897b99eb1fe4a1-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/6ebb97b5c9fa4e03-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/css/739542feaa0eb5d6.css" as="style"/><link rel="stylesheet" href="/_next/static/css/739542feaa0eb5d6.css" data-n-g=""/><link rel="preload" href="/_next/static/css/6eaaae73502dbb8b.css" as="style"/><link rel="stylesheet" href="/_next/static/css/6eaaae73502dbb8b.css" data-n-p=""/><link rel="preload" href="/_next/static/css/3ca096f50280ff34.css" as="style"/><link rel="stylesheet" href="/_next/static/css/3ca096f50280ff34.css"/><link rel="preload" href="/_next/static/css/bc90709fce58dfab.css" as="style"/><link rel="stylesheet" href="/_next/static/css/bc90709fce58dfab.css"/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script defer="" src="/_next/static/chunks/1675-791540eff011a267.js"></script><script defer="" src="/_next/static/chunks/7018-350fb145fca5408b.js"></script><script defer="" src="/_next/static/chunks/5397.ea36616a5104d6b4.js"></script><script defer="" src="/_next/static/chunks/2991.fa051372149617cf.js"></script><script defer="" src="/_next/static/chunks/5512.16698d46e5d40736.js"></script><script src="/_next/static/chunks/webpack-1ca8971788db79df.js" defer=""></script><script src="/_next/static/chunks/framework-2c15c603e130d21e.js" defer=""></script><script src="/_next/static/chunks/main-47f9c8f6b1a88945.js" defer=""></script><script src="/_next/static/chunks/pages/_app-14e0d2363f4800a5.js" defer=""></script><script src="/_next/static/chunks/9097-a10e004d036ef5df.js" defer=""></script><script src="/_next/static/chunks/5351-f89038d388098723.js" defer=""></script><script src="/_next/static/chunks/1868-26297691b14243a3.js" defer=""></script><script src="/_next/static/chunks/8438-f3e8b4f5b03b73c9.js" defer=""></script><script src="/_next/static/chunks/7289-aa451c4dee9559e2.js" defer=""></script><script src="/_next/static/chunks/9599-5d88897328669e3d.js" defer=""></script><script src="/_next/static/chunks/2901-6fb4108b58ada6b6.js" defer=""></script><script src="/_next/static/chunks/3482-643fa9370fb15f5f.js" defer=""></script><script src="/_next/static/chunks/175-1e150c6ed6f773ab.js" defer=""></script><script src="/_next/static/chunks/8608-756422d3d4d957ba.js" defer=""></script><script src="/_next/static/chunks/7545-e6c8abee5df1f098.js" defer=""></script><script src="/_next/static/chunks/9685-6cc144859c1a650b.js" defer=""></script><script src="/_next/static/chunks/2402-068b9945558cf200.js" defer=""></script><script src="/_next/static/chunks/733-90ce78dd52f8c227.js" defer=""></script><script src="/_next/static/chunks/6221-0a40755fc00242d1.js" defer=""></script><script src="/_next/static/chunks/2711-b0c5a9db0355f061.js" defer=""></script><script src="/_next/static/chunks/7563-5303114042e0c423.js" defer=""></script><script src="/_next/static/chunks/6042-0bed1ed5f3ff7406.js" defer=""></script><script src="/_next/static/chunks/pages/editorial/%5BeditorialType%5D/%5Bslug%5D-49e189045540492e.js" defer=""></script><script src="/_next/static/rhWVY8aLc_onZdcTVMCea/_buildManifest.js" defer=""></script><script src="/_next/static/rhWVY8aLc_onZdcTVMCea/_ssgManifest.js" defer=""></script></head><body class="__variable_f033c5 __variable_a67658"><div id="__next"><div class="__variable_f033c5 __variable_a67658"><div class="d-flex flex-column min-vh-100"><header class="HeaderWrapper_wrapper__tFRA6 header-wrapper fixed-top font-heading-semibold"><nav role="banner" class="HeaderWrapper_menuHeader__AikIr vw-100 mw-100 align-self-center px-0 px-xl-2 py-2 navbar navbar-expand-xl navbar-light"><div class="HeaderWrapper_navBarWrapper__hGsMc container-xxl"><button aria-controls="collapsable" type="button" aria-label="Toggle navigation" class="navbar-toggler collapsed"><span class="navbar-toggler-icon"></span></button><div class="Branding_navbarBrand__CDT91 Branding_centered__56XIV me-0 order-first"><a title="SC Media" href="/" class="d-block w-fit me-0 navbar-brand"><svg xmlns="http://www.w3.org/2000/svg" id="HeaderLogo_svg__SC" viewBox="12.28 17.02 422.27 164.72"><defs><style>.HeaderLogo_svg__cls-3{fill:gray}</style></defs><circle cx="94.62" cy="99.37" r="82.33" style="fill:#ee1c25"></circle><path d="M105.67 116.39c3.73 3.82 8.61 5.68 14.65 5.68 7.1 0 13.23-3.37 16.16-8.79l10.57 6.13c-5.33 8.97-15.36 14.65-26.73 14.65-9.32 0-17.05-3.11-23.18-9.32-2.26-2.29-4.09-4.78-5.51-7.46-.44 4.85-2.52 8.74-6.21 11.72-4.17 3.38-9.59 5.06-16.25 5.06-12.34 0-20.96-5.86-24.42-15.36l10.48-6.13c2.4 6.3 7.19 9.5 14.3 9.5s9.95-2.75 9.95-6.57c0-2.22-.98-3.91-2.93-5.06-1.96-1.24-5.42-2.57-10.48-4-5.59-1.69-8.97-3.02-12.88-5.77-3.82-2.84-5.86-7.1-5.86-12.79s1.95-10.12 5.95-13.41c4-3.37 8.88-5.06 14.48-5.06 10.04 0 17.94 5.15 22.2 13.94l-10.3 5.95c-2.49-5.33-6.48-7.99-11.9-7.99-5.06 0-8.17 2.58-8.17 6.22 0 1.95.8 3.55 2.4 4.8 1.69 1.15 4.8 2.49 9.41 3.91l4.26 1.42c.98.27 2.31.8 4 1.51 1.69.62 3.02 1.24 3.91 1.87 1.35.83 3.2 2.23 4.56 3.74-.08-.99-.12-2-.12-3.03 0-9.15 3.02-16.87 9.15-23 6.13-6.22 13.85-9.32 23.18-9.32 11.28 0 21.4 5.68 26.73 14.65l-10.57 6.13c-3.11-5.59-9.06-8.88-16.16-8.88-6.04 0-10.92 1.86-14.65 5.68-3.64 3.82-5.51 8.7-5.51 14.74s1.87 10.83 5.51 14.65Z" style="fill:#fff"></path><path d="M259.02 68.06v62.16h-10.21V85.91l-18.92 31.26h-1.24l-18.92-31.35v44.4h-10.21V68.06h11.01l18.74 31.08 18.83-31.08h10.92ZM274.6 112.1c1.42 6.75 6.84 10.48 14.21 10.48 5.06 0 8.88-1.87 11.46-5.51l7.9 4.62c-4.35 6.48-10.83 9.68-19.45 9.68-7.19 0-13.05-2.22-17.5-6.57-4.44-4.44-6.66-10.04-6.66-16.79s2.22-12.17 6.57-16.61c4.35-4.53 10.04-6.75 16.87-6.75 6.48 0 11.81 2.31 15.99 6.84 4.17 4.53 6.31 10.12 6.31 16.61 0 .98-.09 2.31-.36 4H274.6Zm26.02-7.81c-1.33-7.19-6.39-10.92-12.7-10.92-7.1 0-12.08 4.17-13.41 10.92h26.11ZM351.86 68.06h9.59v62.16h-9.59v-6.39c-3.64 5.06-8.79 7.55-15.54 7.55-6.13 0-11.28-2.22-15.63-6.75-4.35-4.53-6.48-10.12-6.48-16.61s2.13-12.08 6.48-16.61c4.35-4.53 9.5-6.75 15.63-6.75 6.75 0 11.9 2.49 15.54 7.46V68.05Zm-14.03 54.17c4 0 7.37-1.33 10.04-4 2.66-2.75 4-6.13 4-10.21s-1.33-7.46-4-10.12c-2.66-2.75-6.04-4.08-10.04-4.08s-7.37 1.33-10.04 4.08c-2.66 2.67-4 6.04-4 10.12s1.33 7.46 4 10.21c2.66 2.66 6.04 4 10.04 4ZM371.84 77.38c-2.4-2.49-2.4-6.22 0-8.61a6 6 0 0 1 8.7 0c2.4 2.4 2.4 6.13-.09 8.61-2.4 2.4-6.13 2.4-8.61 0Zm-.44 52.84v-44.4h9.59v44.4h-9.59ZM424.95 85.82h9.59v44.4h-9.59v-6.39c-3.64 5.06-8.79 7.55-15.54 7.55-6.13 0-11.28-2.22-15.63-6.75-4.35-4.53-6.48-10.12-6.48-16.61s2.13-12.08 6.48-16.61c4.35-4.53 9.5-6.75 15.63-6.75 6.75 0 11.9 2.49 15.54 7.46v-6.31Zm-14.03 36.41c4 0 7.37-1.33 10.04-4 2.66-2.75 4-6.13 4-10.21s-1.33-7.46-4-10.12c-2.66-2.75-6.04-4.08-10.04-4.08s-7.37 1.33-10.04 4.08c-2.66 2.67-4 6.04-4 10.12s1.33 7.46 4 10.21c2.66 2.66 6.04 4 10.04 4Z"></path><path d="m214.78 167.39-1.34-3.85h-8.14l-1.34 3.85h-3.42l6.94-19.12h3.77l6.91 19.12h-3.39Zm-8.44-6.8h6.06l-3.03-8.63-3.03 8.63ZM227.85 164.9c-1.88-1.91-2.84-4.26-2.84-7.07s.96-5.16 2.84-7.05c1.89-1.91 4.29-2.87 7.16-2.87 3.47 0 6.58 1.75 8.22 4.56l-2.73 1.59c-1.01-1.89-3.08-3.09-5.49-3.09-2.05 0-3.69.66-4.97 1.94-1.26 1.28-1.89 2.92-1.89 4.92s.63 3.63 1.89 4.91c1.28 1.28 2.92 1.94 4.97 1.94 2.4 0 4.51-1.2 5.49-3.09l2.73 1.56c-.79 1.39-1.94 2.51-3.41 3.36-1.45.82-3.06 1.23-4.81 1.23-2.87 0-5.27-.96-7.16-2.84ZM256.18 167.39l-4.04-6.96h-3.71v6.96h-3.14v-19.12h7.64c1.72 0 3.17.6 4.34 1.8 1.2 1.17 1.8 2.62 1.8 4.34 0 2.43-1.53 4.64-3.8 5.54l4.34 7.43h-3.44Zm-7.76-16.17v6.39h4.51c1.67 0 3-1.42 3-3.2s-1.34-3.2-3-3.2h-4.51ZM273.94 167.39l-1.34-3.85h-8.14l-1.34 3.85h-3.42l6.94-19.12h3.77l6.91 19.12h-3.39Zm-8.44-6.8h6.06l-3.03-8.63-3.03 8.63ZM327.44 167.39l-4.04-6.96h-3.71v6.96h-3.14v-19.12h7.64c1.72 0 3.17.6 4.34 1.8 1.2 1.17 1.8 2.62 1.8 4.34 0 2.43-1.53 4.64-3.8 5.54l4.34 7.43h-3.44Zm-7.76-16.17v6.39h4.51c1.67 0 3-1.42 3-3.2s-1.34-3.2-3-3.2h-4.51ZM334.17 161.82c.44 2.07 2.1 3.22 4.37 3.22 1.56 0 2.73-.57 3.52-1.69l2.43 1.42c-1.34 1.99-3.33 2.98-5.98 2.98-2.21 0-4.01-.68-5.38-2.02-1.37-1.37-2.05-3.09-2.05-5.16s.68-3.74 2.02-5.11c1.34-1.39 3.08-2.07 5.19-2.07 1.99 0 3.63.71 4.92 2.1 1.28 1.39 1.94 3.11 1.94 5.11 0 .3-.03.71-.11 1.23h-10.87Zm8-2.4c-.41-2.21-1.97-3.36-3.9-3.36-2.19 0-3.71 1.29-4.12 3.36h8.03ZM351.87 159.27c2.1.46 4.83 1.34 4.78 4.26 0 1.31-.52 2.35-1.53 3.09-1.01.74-2.27 1.12-3.8 1.12-2.7 0-4.7-1.2-5.57-3.2l2.54-1.47c.46 1.31 1.47 1.97 3.03 1.97s2.32-.52 2.32-1.53c0-.87-1.15-1.39-2.59-1.75-2.05-.52-4.81-1.34-4.75-4.2 0-1.26.46-2.27 1.42-3.03.96-.76 2.16-1.15 3.58-1.15 2.27 0 4.1 1.07 5.05 2.84l-2.49 1.39c-.46-1.04-1.34-1.56-2.57-1.56-1.12 0-1.99.49-1.99 1.45 0 .9 1.15 1.37 2.57 1.77ZM359.69 165.67c-1.39-1.39-2.1-3.08-2.1-5.11s.71-3.72 2.1-5.11c1.39-1.39 3.11-2.07 5.11-2.07s3.71.68 5.11 2.07c1.39 1.39 2.1 3.09 2.1 5.11s-.71 3.71-2.1 5.11c-1.39 1.39-3.09 2.08-5.11 2.08s-3.71-.68-5.11-2.08Zm5.11-.79c1.2 0 2.21-.41 3.03-1.23.82-.82 1.23-1.86 1.23-3.08s-.41-2.27-1.23-3.09c-.82-.82-1.83-1.23-3.03-1.23s-2.21.41-3.03 1.23c-.82.82-1.23 1.86-1.23 3.09s.41 2.27 1.23 3.08c.82.82 1.83 1.23 3.03 1.23ZM383.35 153.73h2.95v13.66h-2.95v-1.75c-.9 1.39-2.29 2.1-4.23 2.1-3.14 0-5.24-2.13-5.24-5.63v-8.39h2.95v8.09c0 2.05 1.17 3.17 3.06 3.17 2.07 0 3.47-1.28 3.47-3.93v-7.32ZM392.15 156.03c.74-1.69 2.16-2.54 4.2-2.54v3.2c-1.12-.08-2.1.19-2.95.82-.85.6-1.26 1.61-1.26 3v6.88h-2.95v-13.66h2.95v2.29ZM398.65 165.67c-1.37-1.39-2.05-3.08-2.05-5.11s.68-3.74 2.05-5.11 3.11-2.07 5.16-2.07c2.65 0 5 1.37 6.09 3.52l-2.54 1.47c-.63-1.31-1.94-2.1-3.58-2.1-1.2 0-2.21.41-3.03 1.23-.79.82-1.2 1.83-1.2 3.06s.41 2.24 1.2 3.06c.82.82 1.83 1.23 3.03 1.23 1.61 0 2.98-.82 3.63-2.1l2.54 1.45c-1.17 2.19-3.5 3.55-6.14 3.55-2.05 0-3.77-.68-5.16-2.08ZM413.65 161.82c.44 2.07 2.1 3.22 4.37 3.22 1.56 0 2.73-.57 3.52-1.69l2.43 1.42c-1.34 1.99-3.33 2.98-5.98 2.98-2.21 0-4.01-.68-5.38-2.02-1.37-1.37-2.05-3.09-2.05-5.16s.68-3.74 2.02-5.11c1.34-1.39 3.08-2.07 5.19-2.07 1.99 0 3.63.71 4.92 2.1 1.28 1.39 1.94 3.11 1.94 5.11 0 .3-.03.71-.11 1.23h-10.87Zm8-2.4c-.41-2.21-1.97-3.36-3.9-3.36-2.19 0-3.71 1.29-4.12 3.36h8.03ZM294.75 173.45c-.08 0-.16-.03-.23-.07l-10.86-7.75a.46.46 0 0 1-.16-.23l-3.61-16.17c-.04-.17.04-.35.2-.43l14.48-7.88c.12-.06.26-.06.38 0l14.46 7.88c.15.08.23.26.2.43L306 165.42c-.02.1-.08.18-.16.24l-10.85 7.73a.39.39 0 0 1-.23.07Zm.55-7.66v6.02l8.45-6.02h-8.45Zm-9.54 0 8.43 6.01v-6.01h-8.43Zm9.84-1.11h9.01l-4.51-10.01-4.51 10.01Zm-10.72 0h9.01l-4.51-10.01-4.51 10.01Zm5.35-10.8 4.51 10.02 4.51-10.02h-9.02Zm10.63-.21 4.43 9.84 2.97-13.28-7.39 3.45Zm-19.62-3.45 2.97 13.28 4.43-9.83-7.39-3.45Zm9 2.57h9.02l-4.51-10.01-4.51 10.01Zm-8.57-3.59 7.42 3.47 4.48-9.96-11.91 6.49Zm14.26-6.49 4.48 9.95 7.43-3.46-11.91-6.49Z" class="HeaderLogo_svg__cls-3"></path></svg></a></div><div class="Header_ssoColumn__IISom order-4 order-md-last mt-1 navbar-nav"><span class="SsoHeader_greetingsWrapper__VkCCc" style="min-width:15%;min-height:1px"></span></div><div class="justify-content-center order-last order-xl-0 navbar-collapse collapse" id="collapsable"><div class="nav-fill d-flex navbar-nav"><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/ciso-stories" data-rr-ui-event-key="/ciso-stories" class="nav-link nav-link">CISO Stories</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158181" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Topics</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="748154" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Topic Hubs</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158205" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Events</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="466202" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Podcasts</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158213" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Research</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158217" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Recognition</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="476722" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">About</a></div></div></div><div class="Header_search__lGf0E"><button class="InlineSearch_toggle__k4nSw border-0 px-2 mx-1 search-toggle" aria-labelledby="header-search-bar-toggle"><svg xmlns="http://www.w3.org/2000/svg" fill="none" stroke="currentColor" aria-hidden="true" viewBox="-2 -2 20 20" width="20" height="20" class="InlineSearch_icon__Nu2iI"><circle cx="6.5" cy="6.5" r="5.75" stroke-width="1.5"></circle><path stroke-linecap="round" stroke-width="1.5" d="M11.061 11 15 14.939"></path></svg><span id="header-search-bar-toggle" hidden="">Open<!-- --> Search Bar</span></button></div></div></nav></header><main class="flex-grow-1 d-flex flex-column"><div class="editorial-page typography-v2"><div class="Placeholder_base__bMucx slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column p-0 position-fixed left-0 skin dfp-slot ad align-items-center"><div class=""><div class="mx-auto" id=":R2km:"></div></div></div><meta name="googlebot" content="index,follow"/><div class="EditorialTemplate_singleEditorial__dgKUQ editorial-content"><div class="container-xxl"><div class="justify-content-center row"><div class="justify-content-center text-center col"><div class="Placeholder_base__bMucx Placeholder_leaderboard__4YqCq Placeholder_withDisclaimer__SC2O5 slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column dfp-slot ad align-items-center"><div class="my-auto"><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":Ramkm:"></div></div></div></div><div class="col-sm-12"></div></div></div><div class="content content-7-3 container-xxl"><div class="justify-content-center row"><div class="Regions_contentColumn__zwode content-column col-md-7"><div class="Content_col__2bQ_M px-3"><div></div><a class="text-xlarge" href="https://www.scworld.com/topic/data-security">Data Security</a>, <a class="text-xlarge" href="https://www.scworld.com/topic/mergers-and-acquisitions">Mergers and Acquisitions</a><h1 class="tmb-3">Normalyze to be purchased by Proofpoint</h1><span class="d-flex flex-row justify-content-between align-items-center"><time class="d-inline-block non-interactive text-small" dateTime="2024-10-30T09:16:00.000-04:00">October 30, 2024</time><div class="d-flex position-relative"><div class="d-flex flex-row align-items-center justify-content-center h-100"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" fill="none" viewBox="0 0 24 24" class="icon-accent share"><path fill="#333" d="M18 22a2.893 2.893 0 0 1-2.125-.875A2.893 2.893 0 0 1 15 19c0-.117.008-.238.025-.363s.042-.238.075-.337l-7.05-4.1c-.283.25-.6.446-.95.588-.35.142-.717.213-1.1.212a2.893 2.893 0 0 1-2.125-.875A2.893 2.893 0 0 1 3 12c0-.833.292-1.542.875-2.125A2.893 2.893 0 0 1 6 9c.383 0 .75.071 1.1.213.35.142.667.338.95.587l7.05-4.1a1.843 1.843 0 0 1-.075-.337A2.734 2.734 0 0 1 15 5c0-.833.292-1.542.875-2.125A2.893 2.893 0 0 1 18 2c.833 0 1.542.292 2.125.875S21 4.167 21 5s-.292 1.542-.875 2.125A2.893 2.893 0 0 1 18 8c-.383 0-.75-.07-1.1-.212a3.273 3.273 0 0 1-.95-.588L8.9 11.3c.033.1.058.213.075.338a2.747 2.747 0 0 1 0 .725 1.813 1.813 0 0 1-.075.337l7.05 4.1c.283-.25.6-.446.95-.587.35-.141.717-.212 1.1-.213.833 0 1.542.292 2.125.875S21 18.167 21 19s-.292 1.542-.875 2.125A2.893 2.893 0 0 1 18 22Z"></path></svg><span class="non-interactive text-small px-2">Share</span></div></div></span><div><div class="Content_separatorLine__2DAtM w-100 my-3"></div><span class="d-inline-block pe-2 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span>By </span><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span></span></div><div><div class="tmt-3"><img alt="" fetchpriority="high" width="2560" height="960" decoding="async" data-nimg="1" class="EditorialImage_featuredImage__zX88C w-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 2560 960&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 992px) 96vw,(max-width: 1400px) 60vw,744px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg"/></div></div><article class="Content_content__tfAq8 font-body-large tmt-3"><div class="GuttenbergBlockFactory_wrapper__AcvAp"><p>San Francisco-based data security posture management firm Normalyze is set to be acquired by major U.S. enterprise cybersecurity company&nbsp;<a href="https://www.scworld.com/brief/widespread-email-spoofing-facilitated-by-proofpoint-email-routing-flaw" target="_blank" id="" rel="noreferrer noopener">Proofpoint</a>&nbsp;in a deal whose financial terms are still under wraps but is poised to be finalized in November,&nbsp;<a href="https://www.securityweek.com/proofpoint-to-acquire-data-security-posture-management-firm-normalyze/" target="_blank" id="" rel="noreferrer noopener">SecurityWeek</a>&nbsp;reports.</p><div class="Placeholder_base__bMucx Placeholder_boxInline__i8JCj Placeholder_withDisclaimer__SC2O5 slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column clear-both dfp-slot ad align-items-center"><div class=""><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":R36cr6km:"></div></div></div><p>Such an acquisition would facilitate the integration of Normalyze's DSPM technology into Proofpoint's cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts. "As data has become increasingly difficult to secure, the driving force behind our mission and technology has been to help organizations secure the data they care about, wherever it is. By joining forces with Proofpoint, we can empower organizations to further improve their data security posture, reducing the risk of data breaches caused by human errors and help them to prioritize data loss threats," said Normalyze co-founder and Chief Technology Officer Ravi Ithal.</p></div></article><div></div><div><div class="EditorialAuthor_authorBio__f9fEO row"><div class="col-auto col"><img alt="SC Staff" loading="lazy" width="150" height="150" decoding="async" data-nimg="1" class="EditorialAuthor_authorImage__oZWdE MediaItem_img__QQ6NG" style="color:transparent" sizes="60px" srcSet="/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=64&amp;q=75 64w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=96&amp;q=75 96w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=128&amp;q=75 128w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=256&amp;q=75 256w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=384&amp;q=75 384w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=576&amp;q=75 576w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=768&amp;q=75 768w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=992&amp;q=75 992w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=1200&amp;q=75 1200w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=1400&amp;q=75 1400w, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=1920&amp;q=75 1920w" src="/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fscm-person.e6ed9e91.png&amp;w=1920&amp;q=75"/></div><div class="col"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="text-large font-weight-bold"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span></div></div></div></div><div class="py-3 py-md-4 mt-0 mb-0"><section itemscope="" itemType="https://schema.org/Collection" class="ContentTeaser_sectionWrapper__MJJCo teaser-list"><h3 class="layout-title-large text-capitalize ContentTeaser_blockHeader__QttOs mx-3 mx-md-4">Related</h3><div class="Placeholder_base__bMucx slot_wrapper__JFKwH slot_native__8EO55 LandingTeaser_spacing__TVfzN w-100 dfp-slot ad align-items-center"><div class=""><div class="mx-auto" id=":R1nb6km:"></div></div></div><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/news/new-york-fines-geico-and-travelers-113-million-in-data-breach-cases"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="the Government Employees Insurance Company (Geico) logo is displayed on a smartphone screen." loading="lazy" width="936" height="624" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 936 624&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/11/112624_geico.jpg 1x, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/11/112624_geico.jpg 2x" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/11/112624_geico.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/data-security">Data Security</a></div><a href="/news/new-york-fines-geico-and-travelers-113-million-in-data-breach-cases"><h5 itemProp="headline" class="font-heading">New York fines GEICO and Travelers $11.3 million in data breach cases</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/steve-zurier"><span itemProp="name"><span itemProp="givenName">Steve<!-- --> </span><span itemProp="familyName">Zurier</span></span></a></span><time class="non-interactive" dateTime="2024-11-26T14:47:00.000-05:00">November 26, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>In settling the two breach cases, the auto insurers also agreed to deploy cybersecurity best practices. </p> </div></div></div></div></article><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/formal-unveils-data-access-management-proxy"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="Business man hold,holding cloud computing data and security on global networking,Padlock and cloud icon. Technology of business.Cybersecurity and information or network protection.internet project." loading="lazy" width="2560" height="1188" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 2560 1188&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,UklGRkQBAABXRUJQVlA4IDgBAAAwBwCdASoyABcAPmEkj0UkIiEZ+zVUQAYEswbeArGMBqb+mufM0wDeeCvA9pEc8DTfvYRO3mySMyV93v0TQGFFwBgA/vKIf/uD9QfxAA//52D/70f+mOC/Ib5jV0v1ukD/kALi+vpUYf4htgBsTklbAZfFsgXnH+w//VxmC85/848MzPKgW+1JdyEFzJTzy4/oQ2u7CT6axPVxe473wl5JV6i75CKz/KkYrT6Uh1xoawVk4dUqVzy2kcnyzeaUbf0Yul4+iL+5BA/1qb9z9pBha6NYJd0X3/J4Z3xNuBrWlS2ZVDXSI1TfUsrKpysVJHVa23KWRNkRRVnttcdjO1+CJqBuEGd0otnLHLhRzR3ANCTKAfZKcOP0syOzKOriDbT+ko+3sazy1vvm9mpZJ1nBQMVeYQAAAAA=&#x27;/%3E%3C/svg%3E&quot;)" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/01/MicrosoftTeams-image-46-scaled.jpg 1x" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/01/MicrosoftTeams-image-46-scaled.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/data-security">Data Security</a></div><a href="/brief/formal-unveils-data-access-management-proxy"><h5 itemProp="headline" class="font-heading">Formal unveils data access management proxy</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2024-11-26T10:02:00.000-05:00">November 26, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Deployed within a virtual private cloud, Formal logs every request to an enterprise's data stores, such as databases containing customer information, and enforces dynamic access policies.</p> </div></div></div></div></article><article itemscope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemscope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/geico-travelers-to-pay-new-york-over-11m-for-data-breaches"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="(Adobe Stock)" loading="lazy" width="800" height="467" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 800 467&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/08/AdobeStock_730400135.jpg 1x, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/08/AdobeStock_730400135.jpg 2x" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/08/AdobeStock_730400135.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/breach">Breach</a></div><a href="/brief/geico-travelers-to-pay-new-york-over-11m-for-data-breaches"><h5 itemProp="headline" class="font-heading">Geico, Travelers to pay New York over $11M for data breaches</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemscope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2024-11-26T09:17:00.000-05:00">November 26, 2024</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>More than 116,000 New York residents had their driver's license numbers compromised from Geico's systems following the exploitation of its apps' pre-fill functionality and Application Programming Interface, as well as fraudulent policy purchases and claims filing, beginning November 2020, with the insurer only resolving its systems vulnerabilities by March 2021.</p> </div></div></div></div></article></section></div></div><div class="Regions_contentColumn__zwode content-column col-md-3"><div itemscope="" itemType="https://schema.org/Collection" class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 typography-v2"><h3 itemProp="name" class="fs-4 shallow-fs-4 underlined-text BlockWrapper_blockHeader__7q7cS">Related Events</h3><div class="SidebarList_basicList__ct6q8 sidebar-list col"><ul class="list-unstyled mb-0 p-0 gx-0 tmt-3"><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scworld.com/cybercast/unlocking-the-power-of-public-data-make-your-security-team-faster-and-more-effective"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/unlocking-the-power-of-public-data-make-your-security-team-faster-and-more-effective"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">Unlocking the Power of Public Data: Make Your Security Team Faster and More Effective</h5></a><p class="mb-0"><meta itemProp="startDate" content="2024-11-18T14:00:00.000-05:00"/><meta itemProp="endDate" content="2024-11-18T15:00:00.000-05:00"/><span class="text-small text-muted font-weight-semibold non-interactive">On-Demand Event</span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scworld.com/cybercast/microsoft-copilot-how-to-minimize-data-security-risks-during-adoption"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/microsoft-copilot-how-to-minimize-data-security-risks-during-adoption"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">Microsoft Copilot: How to Minimize Data Security Risks During Adoption</h5></a><p class="mb-0"><meta itemProp="startDate" content="2024-11-19T12:00:00.000-05:00"/><meta itemProp="endDate" content="2024-11-19T13:00:00.000-05:00"/><span class="text-small text-muted font-weight-semibold non-interactive">On-Demand Event</span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemscope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemscope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemscope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scworld.com/cybercast/beyond-the-buzzwords-choosing-essential-tools-for-your-security-stack"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/beyond-the-buzzwords-choosing-essential-tools-for-your-security-stack"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">Beyond the Buzzwords: Choosing Essential Tools for Your Security Stack</h5></a><p class="mb-0"><meta itemProp="startDate" content="2024-10-03T14:00:00.000-04:00"/><meta itemProp="endDate" content="2024-10-03T15:00:00.000-04:00"/><span class="text-small text-muted font-weight-semibold non-interactive">On-Demand Event</span></p></div></li></ul></div></div><div class="TermsList_container__fRvfk p-4 d-flex flex-column typography-v2 m-1"><p class="TermsList_font__w60KC mb-2 fw-bold">Related Terms</p><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/B#block_cipher">Block Cipher</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/B#byte">Byte</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/C#ciphertext">Ciphertext</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/C#cryptographic_hash_functions">Cryptographic Hash Functions</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/C#cyclic_redundancy_check_crc">Cyclic Redundancy Check (CRC)</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/D#data_aggregation">Data Aggregation</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/D#data_encryption_standard_des">Data Encryption Standard (DES)</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/D#decryption">Decryption</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/D#digital_envelope">Digital Envelope</a><a class="TermsList_linkText__HZ_vF mb-1" href="/glossary/D#digital_signature">Digital Signature</a></div><div class="Placeholder_base__bMucx Placeholder_box__TtFgt Placeholder_withDisclaimer__SC2O5 slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column my-auto dfp-slot ad align-items-center"><div class=""><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":R1t6km:"></div></div></div><div class="DailyScanMarketoForm_wrapper__rsZEF daily-scan-form"><div class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0"><h3 class="fs-4 underlined-text mb-3 border-0 text-uppercase">Get daily email updates</h3><div class="fs-6 mb-3">SC Media&#x27;s daily must-read of the most current and pressing daily news</div><form class="w-100"><div class="my-2 font-body"><label for="email" class="visually-hidden form-label col-form-label col">Business Email</label><input required="" placeholder="Business Email*" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""/></div><div class="fs-9 my-4"><p>By clicking the Subscribe button below, you agree to <span class="text-nowrap">SC Media<!-- --> </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use">Terms of Use</a><span> and </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a>.</p></div><div class="row"><button type="submit" class="col-6 btn btn-primary">Subscribe</button></div></form></div></div><div class="Placeholder_base__bMucx Placeholder_box__TtFgt Placeholder_withDisclaimer__SC2O5 slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column my-auto dfp-slot ad align-items-center"><div class=""><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":R2t6km:"></div></div></div></div></div></div><div class="container-xxl"><div class="justify-content-center row"><div class="justify-content-center text-center col-xxl-10"><div class="Placeholder_base__bMucx Placeholder_leaderboard__4YqCq Placeholder_withDisclaimer__SC2O5 slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column dfp-slot ad align-items-center"><div class="my-auto"><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":R1mkm:"></div></div></div></div></div></div></div><div><div class="Placeholder_base__bMucx slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column d-none dfp-slot ad align-items-center"><div class=""><div class="mx-auto" id=":R8km:"></div></div></div></div></div></main><footer class="Footer_footerContainer__gOPdY pt-3 pb-5 font-tiltilium container-xxl"><hr class="Footer_topBorder__93LuI pt-5 pb-2 mx-auto"/><div class="justify-content-center row"><div class="col-lg-10"><div class="mb-1 row"><div class="col-lg-auto col-sm-12"><nav><div class="justify-content-center row"><div class="p-0 col-auto"><a title="SC Media" href="/"><svg xmlns="http://www.w3.org/2000/svg" viewBox="6.28 12.02 176.7 176.72" height="150" width="150"><circle cx="94.62" cy="99.37" r="82.33" style="fill:#ee1c25"></circle><path d="M105.67 116.39c3.73 3.82 8.61 5.68 14.65 5.68 7.1 0 13.23-3.37 16.16-8.79l10.57 6.13c-5.33 8.97-15.36 14.65-26.73 14.65-9.32 0-17.05-3.11-23.18-9.32-2.26-2.29-4.09-4.78-5.51-7.46-.44 4.85-2.52 8.74-6.21 11.72-4.17 3.38-9.59 5.06-16.25 5.06-12.34 0-20.96-5.86-24.42-15.36l10.48-6.13c2.4 6.3 7.19 9.5 14.3 9.5s9.95-2.75 9.95-6.57c0-2.22-.98-3.91-2.93-5.06-1.96-1.24-5.42-2.57-10.48-4-5.59-1.69-8.97-3.02-12.88-5.77-3.82-2.84-5.86-7.1-5.86-12.79s1.95-10.12 5.95-13.41c4-3.37 8.88-5.06 14.48-5.06 10.04 0 17.94 5.15 22.2 13.94l-10.3 5.95c-2.49-5.33-6.48-7.99-11.9-7.99-5.06 0-8.17 2.58-8.17 6.22 0 1.95.8 3.55 2.4 4.8 1.69 1.15 4.8 2.49 9.41 3.91l4.26 1.42c.98.27 2.31.8 4 1.51 1.69.62 3.02 1.24 3.91 1.87 1.35.83 3.2 2.23 4.56 3.74-.08-.99-.12-2-.12-3.03 0-9.15 3.02-16.87 9.15-23 6.13-6.22 13.85-9.32 23.18-9.32 11.28 0 21.4 5.68 26.73 14.65l-10.57 6.13c-3.11-5.59-9.06-8.88-16.16-8.88-6.04 0-10.92 1.86-14.65 5.68-3.64 3.82-5.51 8.7-5.51 14.74s1.87 10.83 5.51 14.65Z" style="fill:#fff"></path></svg></a></div></div><div class="justify-content-center social-icons row"><div class="col-auto"><a title="SCMagazine on Facebook" class="d-flex p-0" target="_blank" href="https://www.facebook.com/SCMag/"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" stroke="currentColor" viewBox="0 0 24 24" class="icon-primary facebook"><path fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="1.5" d="M17 2h-3a5 5 0 0 0-5 5v3H6v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3V2Z"></path></svg></a></div><div class="col-auto"><a title="SCMagazine on Twitter" class="d-flex p-0" target="_blank" href="https://twitter.com/scmagazine"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="-2 -2 24 24" class="icon-primary twitter"><path fill="currentColor" stroke="currentColor" stroke-width="0.625" d="m11.617 8.66 6.33-7.41h-1.5l-5.494 6.434-4.39-6.434H1.5l6.637 9.73L1.5 18.75H3l5.803-6.795 4.636 6.795H18.5L11.617 8.66Zm-2.053 2.405-.673-.969L3.54 2.388h2.304l4.317 6.22.673.97 5.614 8.087h-2.304l-4.58-6.6Z"></path></svg></a></div><div class="col-auto"><a title="SCMagazine on LinkedIn" class="d-flex p-0" target="_blank" href="https://www.linkedin.com/company/scmediaus/"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" class="icon-primary linkedin"><path fill="currentColor" d="M19.868 2.625H4.132c-.832 0-1.507.675-1.507 1.507v15.736c0 .832.675 1.507 1.507 1.507h15.736c.832 0 1.507-.675 1.507-1.507V4.132c0-.832-.675-1.507-1.507-1.507Zm0 17.25c-10.495-.002-15.743-.005-15.743-.007.002-10.495.005-15.743.007-15.743 10.495.002 15.743.005 15.743.007a13277.3 13277.3 0 0 1-.007 15.743ZM5.405 9.654h2.782v8.948H5.405V9.654ZM6.797 8.43a1.614 1.614 0 0 0 .617-3.102 1.613 1.613 0 1 0-.617 3.102Zm5.913 5.745c0-1.167.223-2.297 1.669-2.297 1.425 0 1.446 1.334 1.446 2.372v4.352h2.78v-4.908c0-2.409-.52-4.263-3.335-4.263-1.353 0-2.26.743-2.633 1.446H12.6V9.654H9.93v8.948h2.78v-4.427Z"></path></svg></a></div></div></nav></div><div class="offset-lg-1 col"><nav class="pb-0 pt-2 navbar navbar-expand navbar-light"><div class="container-xxl"><div class="nav-fill d-flex flex-lg-row flex-column justify-content-center w-100 fs-9 navbar-nav"><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC text-uppercase d-block py-0 py-lg-2 px-3 non-interactive fs-5 footer-section-title">About Us</h5><a class="FooterMenu_link__4UH_H footer-nav-element" href="/about-us">SC Media</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://www.cyberriskalliance.com/">CyberRisk Alliance</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/contact-us">Contact Us</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://www.cyberriskalliance.com/careers/">Careers</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy</a></div><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC text-uppercase d-block py-0 py-lg-2 px-3 non-interactive fs-5 footer-section-title">Get Involved</h5><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://pages.cyberriskalliance.com/SC_NL_OptIn-LP.html">Subscribe</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/contribute">Contribute/Speak</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/virtual-conferences">Attend an event</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://cybersecuritycollaboration.com/">Join a peer group</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/become-a-sponsor">Partner With Us</a></div><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC text-uppercase d-block py-0 py-lg-2 px-3 non-interactive fs-5 footer-section-title">Explore</h5><a class="FooterMenu_link__4UH_H footer-nav-element" href="/sw-labs">Product reviews</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/cra-business-intelligence">Research</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/resource-library">White papers</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/webcasts">Webcasts</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/security-weekly">Podcasts</a></div></div></div></nav></div></div><div class="justify-content-center fs-10 row"><div class="col"><div class="non-interactive text-center text-lg-start"><p class="m-0"> Copyright 漏 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. </p><p class="m-0"><span>Your use of this website constitutes acceptance of CyberRisk Alliance </span><a class="text-underline cursor-pointer" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a><span> and </span><a class="text-underline cursor-pointer" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use">Terms of Use</a><span>.</span></p></div></div></div></div></div></footer></div></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"key":"normalyze-to-be-purchased-by-proofpoint","content":{"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff","bio":null,"headshot":null}}]},"topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NTExMQ==","children":{"nodes":[{"id":"dGVybTo3NTExMg=="},{"id":"dGVybTo3NTExMw=="},{"id":"dGVybTo3NTExNA=="},{"id":"dGVybTo3NTExNQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NTExMw==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"editorialTaxonomy":{"topic":[{"__typename":"Topic","id":"dGVybTo3NDYwMA==","link":"https://www.scmagazine.com/topic/data-security","uri":"/topic/data-security","name":"Data Security","slug":"data-security"},{"__typename":"Topic","id":"dGVybTo3NTExMw==","link":"https://www.scmagazine.com/topic/mergers-and-acquisitions","uri":"/topic/mergers-and-acquisitions","name":"Mergers and Acquisitions","slug":"mergers-and-acquisitions"}],"parentTopic":[{"name":"Security Program Controls/Technologies","slug":"security-program-controlstechnologies"},{"name":"Channel investors","slug":"channel-investors"}],"brand":[{"slug":"sc-media","name":"SC Media"}],"industry":null,"region":null,"type":{"slug":"brief"}},"title":"Normalyze to be purchased by Proofpoint","blocks":[{"__typename":"CoreParagraphBlock","attributes":{"__typename":"CoreParagraphBlockAttributes","content":"San Francisco-based data security posture management firm Normalyze is set to be acquired by major U.S. enterprise cybersecurity company\u0026nbsp;\u003ca href=\"https://www.scworld.com/brief/widespread-email-spoofing-facilitated-by-proofpoint-email-routing-flaw\" target=\"_blank\" id=\"\" rel=\"noreferrer noopener\"\u003eProofpoint\u003c/a\u003e\u0026nbsp;in a deal whose financial terms are still under wraps but is poised to be finalized in November,\u0026nbsp;\u003ca href=\"https://www.securityweek.com/proofpoint-to-acquire-data-security-posture-management-firm-normalyze/\" target=\"_blank\" id=\"\" rel=\"noreferrer noopener\"\u003eSecurityWeek\u003c/a\u003e\u0026nbsp;reports."},"saveContent":"\u003cp\u003eSan Francisco-based data security posture management firm Normalyze is set to be acquired by major U.S. enterprise cybersecurity company\u0026nbsp;\u003ca href=\"https://www.scworld.com/brief/widespread-email-spoofing-facilitated-by-proofpoint-email-routing-flaw\" target=\"_blank\" id=\"\" rel=\"noreferrer noopener\"\u003eProofpoint\u003c/a\u003e\u0026nbsp;in a deal whose financial terms are still under wraps but is poised to be finalized in November,\u0026nbsp;\u003ca href=\"https://www.securityweek.com/proofpoint-to-acquire-data-security-posture-management-firm-normalyze/\" target=\"_blank\" id=\"\" rel=\"noreferrer noopener\"\u003eSecurityWeek\u003c/a\u003e\u0026nbsp;reports.\u003c/p\u003e"},{"__typename":"CoreParagraphBlock","attributes":{"__typename":"CoreParagraphBlockAttributes","content":"Such an acquisition would facilitate the integration of Normalyze's DSPM technology into Proofpoint's cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts. \"As data has become increasingly difficult to secure, the driving force behind our mission and technology has been to help organizations secure the data they care about, wherever it is. By joining forces with Proofpoint, we can empower organizations to further improve their data security posture, reducing the risk of data breaches caused by human errors and help them to prioritize data loss threats,\" said Normalyze co-founder and Chief Technology Officer Ravi Ithal."},"saveContent":"\u003cp\u003eSuch an acquisition would facilitate the integration of Normalyze's DSPM technology into Proofpoint's cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts. \"As data has become increasingly difficult to secure, the driving force behind our mission and technology has been to help organizations secure the data they care about, wherever it is. By joining forces with Proofpoint, we can empower organizations to further improve their data security posture, reducing the risk of data breaches caused by human errors and help them to prioritize data loss threats,\" said Normalyze co-founder and Chief Technology Officer Ravi Ithal.\u003c/p\u003e"}],"date":"2024-10-30T09:16:46","slug":"normalyze-to-be-purchased-by-proofpoint","editorialAdvanced":{"relatedBlock":{"title":"Related","numberOfItems":4,"postType":[],"options":["nativeAds"],"taxonomyQuery":{"queryArray":null},"collection":null,"resolvedPostCollection":{"nodes":[{"__typename":"CerberusDfpNativeAd","id":"ea2fc3a4b5e549958e3695d10cf7e4924973db2d","databaseId":89296237},{"__typename":"Editorial","id":"cG9zdDo3ODc0OTE=","databaseId":787491,"uri":"/news/new-york-fines-geico-and-travelers-113-million-in-data-breach-cases","title":"New York fines GEICO and Travelers $11.3 million in data breach cases","date":"2024-11-26T14:47:22","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5MA==","children":{"nodes":[{"id":"dGVybTo3NDYzMw=="},{"id":"dGVybTo3NDU5MQ=="},{"id":"dGVybTo3NDYzNA=="},{"id":"dGVybTo3NDU5Mg=="},{"id":"dGVybTo3NDU5Mw=="},{"id":"dGVybTo3NDU5OA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mw==","children":{"nodes":[{"id":"dGVybTo3NDU5NA=="},{"id":"dGVybTo3NDU5MA=="},{"id":"dGVybTo3NDU4NA=="},{"id":"dGVybTo3NDYwOA=="},{"id":"dGVybTo3NDYwNw=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"Steve Zurier","uri":"/contributor/steve-zurier","slug":"steve-zurier","peopleAdvanced":{"firstName":"Steve","middleName":null,"lastName":"Zurier"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eIn settling the two breach cases, the auto insurers also agreed to deploy cybersecurity best practices. \u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/11/112624_geico.jpg","altText":"the Government Employees Insurance Company (Geico) logo is displayed on a smartphone screen.","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"September 12, 2024, Paraguay. In this photo illustration, the Go","mediaDetails":{"width":936,"height":624},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"News"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/breach","name":"Breach","slug":"breach","id":"dGVybTo3NDYwMg==","uri":"/topic/breach"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/government-regulations","name":"Government Regulations","slug":"government-regulations","id":"dGVybTo3NDU5Mg==","uri":"/topic/government-regulations"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3ODcyMzA=","databaseId":787230,"uri":"/brief/formal-unveils-data-access-management-proxy","title":"Formal unveils data access management proxy","date":"2024-11-26T10:02:03","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDU3OQ==","children":{"nodes":[{"id":"dGVybTo3NDY0MA=="},{"id":"dGVybTo3NTM1Ng=="},{"id":"dGVybTo3NDY0Mg=="},{"id":"dGVybTo3NTM1Nw=="},{"id":"dGVybTo3NDY0NA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eDeployed within a virtual private cloud, Formal logs every request to an enterprise's data stores, such as databases containing customer information, and enforces dynamic access policies.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/01/MicrosoftTeams-image-46-scaled.jpg","altText":"","caption":"\u003cp\u003eBusiness man hold,holding cloud computing data and security on global networking,Padlock and cloud icon. Technology of business.Cybersecurity and information or network protection.internet project.\u003c/p\u003e\n","title":"MicrosoftTeams-image (46)","mediaDetails":{"width":2560,"height":1188},"mediaAdvanced":{"lqip":"UklGRkQBAABXRUJQVlA4IDgBAAAwBwCdASoyABcAPmEkj0UkIiEZ+zVUQAYEswbeArGMBqb+mufM0wDeeCvA9pEc8DTfvYRO3mySMyV93v0TQGFFwBgA/vKIf/uD9QfxAA//52D/70f+mOC/Ib5jV0v1ukD/kALi+vpUYf4htgBsTklbAZfFsgXnH+w//VxmC85/848MzPKgW+1JdyEFzJTzy4/oQ2u7CT6axPVxe473wl5JV6i75CKz/KkYrT6Uh1xoawVk4dUqVzy2kcnyzeaUbf0Yul4+iL+5BA/1qb9z9pBha6NYJd0X3/J4Z3xNuBrWlS2ZVDXSI1TfUsrKpysVJHVa23KWRNkRRVnttcdjO1+CJqBuEGd0otnLHLhRzR3ANCTKAfZKcOP0syOzKOriDbT+ko+3sazy1vvm9mpZJ1nBQMVeYQAAAAA="}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/cloud-security","name":"Cloud Security","slug":"cloud-security","id":"dGVybTo3NDU3OQ==","uri":"/topic/cloud-security"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3ODcxODM=","databaseId":787183,"uri":"/brief/geico-travelers-to-pay-new-york-over-11m-for-data-breaches","title":"Geico, Travelers to pay New York over $11M for data breaches","date":"2024-11-26T09:17:13","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5MA==","children":{"nodes":[{"id":"dGVybTo3NDYzMw=="},{"id":"dGVybTo3NDU5MQ=="},{"id":"dGVybTo3NDYzNA=="},{"id":"dGVybTo3NDU5Mg=="},{"id":"dGVybTo3NDU5Mw=="},{"id":"dGVybTo3NDU5OA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mw==","children":{"nodes":[{"id":"dGVybTo3NDU5NA=="},{"id":"dGVybTo3NDU5MA=="},{"id":"dGVybTo3NDU4NA=="},{"id":"dGVybTo3NDYwOA=="},{"id":"dGVybTo3NDYwNw=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eMore than 116,000 New York residents had their driver's license numbers compromised from Geico's systems following the exploitation of its apps' pre-fill functionality and Application Programming Interface, as well as fraudulent policy purchases and claims filing, beginning November 2020, with the insurer only resolving its systems vulnerabilities by March 2021.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/08/AdobeStock_730400135.jpg","altText":"","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"breach_AdobeStock_730400135","mediaDetails":{"width":800,"height":467},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/breach","name":"Breach","slug":"breach","id":"dGVybTo3NDYwMg==","uri":"/topic/breach"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/government-regulations","name":"Government Regulations","slug":"government-regulations","id":"dGVybTo3NDU5Mg==","uri":"/topic/government-regulations"}]},"sponsor":{"sponsors":[]}}]}},"featuredImageCaption":null,"showFeaturedImage":true,"hideAuthor":null,"deck":"\u003cp\u003eSuch an acquisition would facilitate the integration of Normalyze's DSPM technology into Proofpoint's cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg","altText":"","caption":null,"title":"Cybersecurity analyst evaluating cybersecurity data trends, Threat assessment and computing risk metrics for cybersecurity enhancement goals and risk mitigation, Approach for safeguarding digital.","mediaDetails":{"width":2560,"height":960},"mediaAdvanced":{"lqip":"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"}}}},"sidebarFeed":{"collection":[{"post":{"__typename":"Learning","id":"cG9zdDo3ODE5ODM=","title":"Unlocking the Power of Public Data: Make Your Security Team Faster and More Effective","uri":"/cybercast/unlocking-the-power-of-public-data-make-your-security-team-faster-and-more-effective","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Monday, November 18, 2024 | 02:00 PM America/New_York","endDate":"Monday, November 18, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}}},{"post":{"__typename":"Learning","id":"cG9zdDo3ODEwNTY=","title":"Microsoft Copilot: How to Minimize Data Security Risks During Adoption","uri":"/cybercast/microsoft-copilot-how-to-minimize-data-security-risks-during-adoption","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Tuesday, November 19, 2024 | 12:00 PM America/New_York","endDate":"Tuesday, November 19, 2024 | 01:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}}},{"post":{"__typename":"Learning","id":"cG9zdDo3NDQxNDg=","title":"Beyond the Buzzwords: Choosing Essential Tools for Your Security Stack","uri":"/cybercast/beyond-the-buzzwords-choosing-essential-tools-for-your-security-stack","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Thursday, October 3, 2024 | 02:00 PM America/New_York","endDate":"Thursday, October 3, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}}}]},"related":{"teasers":[{"__typename":"CerberusDfpNativeAd","id":"ea2fc3a4b5e549958e3695d10cf7e4924973db2d","databaseId":89296237},{"__typename":"Editorial","id":"cG9zdDo3ODc0OTE=","databaseId":787491,"uri":"/news/new-york-fines-geico-and-travelers-113-million-in-data-breach-cases","title":"New York fines GEICO and Travelers $11.3 million in data breach cases","date":"2024-11-26T14:47:22","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5MA==","children":{"nodes":[{"id":"dGVybTo3NDYzMw=="},{"id":"dGVybTo3NDU5MQ=="},{"id":"dGVybTo3NDYzNA=="},{"id":"dGVybTo3NDU5Mg=="},{"id":"dGVybTo3NDU5Mw=="},{"id":"dGVybTo3NDU5OA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mw==","children":{"nodes":[{"id":"dGVybTo3NDU5NA=="},{"id":"dGVybTo3NDU5MA=="},{"id":"dGVybTo3NDU4NA=="},{"id":"dGVybTo3NDYwOA=="},{"id":"dGVybTo3NDYwNw=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"Steve Zurier","uri":"/contributor/steve-zurier","slug":"steve-zurier","peopleAdvanced":{"firstName":"Steve","middleName":null,"lastName":"Zurier"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eIn settling the two breach cases, the auto insurers also agreed to deploy cybersecurity best practices. \u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/11/112624_geico.jpg","altText":"the Government Employees Insurance Company (Geico) logo is displayed on a smartphone screen.","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"September 12, 2024, Paraguay. In this photo illustration, the Go","mediaDetails":{"width":936,"height":624},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"News"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/breach","name":"Breach","slug":"breach","id":"dGVybTo3NDYwMg==","uri":"/topic/breach"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/government-regulations","name":"Government Regulations","slug":"government-regulations","id":"dGVybTo3NDU5Mg==","uri":"/topic/government-regulations"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3ODcyMzA=","databaseId":787230,"uri":"/brief/formal-unveils-data-access-management-proxy","title":"Formal unveils data access management proxy","date":"2024-11-26T10:02:03","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDU3OQ==","children":{"nodes":[{"id":"dGVybTo3NDY0MA=="},{"id":"dGVybTo3NTM1Ng=="},{"id":"dGVybTo3NDY0Mg=="},{"id":"dGVybTo3NTM1Nw=="},{"id":"dGVybTo3NDY0NA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eDeployed within a virtual private cloud, Formal logs every request to an enterprise's data stores, such as databases containing customer information, and enforces dynamic access policies.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/01/MicrosoftTeams-image-46-scaled.jpg","altText":"","caption":"\u003cp\u003eBusiness man hold,holding cloud computing data and security on global networking,Padlock and cloud icon. Technology of business.Cybersecurity and information or network protection.internet project.\u003c/p\u003e\n","title":"MicrosoftTeams-image (46)","mediaDetails":{"width":2560,"height":1188},"mediaAdvanced":{"lqip":"UklGRkQBAABXRUJQVlA4IDgBAAAwBwCdASoyABcAPmEkj0UkIiEZ+zVUQAYEswbeArGMBqb+mufM0wDeeCvA9pEc8DTfvYRO3mySMyV93v0TQGFFwBgA/vKIf/uD9QfxAA//52D/70f+mOC/Ib5jV0v1ukD/kALi+vpUYf4htgBsTklbAZfFsgXnH+w//VxmC85/848MzPKgW+1JdyEFzJTzy4/oQ2u7CT6axPVxe473wl5JV6i75CKz/KkYrT6Uh1xoawVk4dUqVzy2kcnyzeaUbf0Yul4+iL+5BA/1qb9z9pBha6NYJd0X3/J4Z3xNuBrWlS2ZVDXSI1TfUsrKpysVJHVa23KWRNkRRVnttcdjO1+CJqBuEGd0otnLHLhRzR3ANCTKAfZKcOP0syOzKOriDbT+ko+3sazy1vvm9mpZJ1nBQMVeYQAAAAA="}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/cloud-security","name":"Cloud Security","slug":"cloud-security","id":"dGVybTo3NDU3OQ==","uri":"/topic/cloud-security"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3ODcxODM=","databaseId":787183,"uri":"/brief/geico-travelers-to-pay-new-york-over-11m-for-data-breaches","title":"Geico, Travelers to pay New York over $11M for data breaches","date":"2024-11-26T09:17:13","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5MA==","children":{"nodes":[{"id":"dGVybTo3NDYzMw=="},{"id":"dGVybTo3NDU5MQ=="},{"id":"dGVybTo3NDYzNA=="},{"id":"dGVybTo3NDU5Mg=="},{"id":"dGVybTo3NDU5Mw=="},{"id":"dGVybTo3NDU5OA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mw==","children":{"nodes":[{"id":"dGVybTo3NDU5NA=="},{"id":"dGVybTo3NDU5MA=="},{"id":"dGVybTo3NDU4NA=="},{"id":"dGVybTo3NDYwOA=="},{"id":"dGVybTo3NDYwNw=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eMore than 116,000 New York residents had their driver's license numbers compromised from Geico's systems following the exploitation of its apps' pre-fill functionality and Application Programming Interface, as well as fraudulent policy purchases and claims filing, beginning November 2020, with the insurer only resolving its systems vulnerabilities by March 2021.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/08/AdobeStock_730400135.jpg","altText":"","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"breach_AdobeStock_730400135","mediaDetails":{"width":800,"height":467},"mediaAdvanced":{"lqip":"UklGRmQEAABXRUJQVlA4IFgEAADwFgCdASoyAB0APoUyk0glIyGhN+gAoBCJbACdMoR8BInqTTECBW5fQBzS/Qn+0HTY+gDeJ+fN/bD4Zv9RW3PAfwdePfY3+X8gZoD+c4Y/eXkS/vXhG/oHaE8V/n/+D79fUC7beU36Ofznw3/jH9m/yvuAfyz+df6j03P+DyifQn7DfAR/Lv7P6Ufrj/YD2bP2jKLNbslAqMi1/oXntdcWr0k299P/hyU34YW+541VNkUANmJ+/SnH2k/Z2Us2ftgA9WuYH5fSg+fr3hNGJZ9yXWtf5vlofAF+IuiEFZMswJeAf/laPGVppyT0GieoJcdLQsM52pIleQNHZNGbZ94LtZ0/ij8Jii9gngCKgj3Itc6yKDXWvkjPvqjPsYRES6fm3PUeCfOVLtu0eKh9C0f5BLRYWahdUwjtpqoO//CpwvZzIgezmdvgt2FNfd0689DoeAgl2ad6c1CKJs7rxQmoYB9HFMrni4gYm0ol1ltpS3o5wxfA9Wz5k80uB2N5wZBXPZbOdpyuo27z1vhDD7oSYncend3em0iaxFV0NGD9qiTEBiX5ullckoFKz7Ics/4wOlDDmmeg2CtC1Wts56IaRL9VI+8vI9T/yxJG+1C8lobEIZ2nNLI9YhL4sYCf0QqaDEZ5aUn1zv8U5gN7BVQG1hjNzNyMf/8Tz3jukyqE4cFl69SiKhwMRZcmGE07YSVyq6vfsd4quNzZd3rUYj+35GsWRvWrE9D5DvTaLXPxE9Kt5NoBTYUNFY/LO2etfUg8SGTn5/irPojS0x+XXfhfBaKRxIiQvsS/+DyfCsu8IRJ/wfXaTsOotAx9/9006pUJBJy4kJ7a4fhywz1jB+uk9dqCNf+0hKwrDBTlYcq66AbcaOKWaAofP9W9CX5ZoUnnLOCP9HcFRzICTKr09OOqTb+C2edorD7xcgbm45pVMFpu8KRGL02A3KpH1nD+1LU3zqxjuSbeWn1OaXYnKpZRroR1vzzPGvGLi3pqBJZ83nXW+HvivdfDbqXJf6EpUclsIJY5ewpldF8V6uRNfi/Z05rf9OesZ/VQdTVDTWK/RhLOEXnjzwXFj0JWvfUUcM6FPeF9WoDz9gElLQ8abX2E+U2e2fKFDtNrN5V2TQQ71FfpmLmvWaiJtv5bM+g3vS3Zn/6q6fYr4h67CSg+p1hM8I9zNSpLpyazzV1j1o66Bjnh0h9vo/hUDoXlkhR1GRfOAGHUnOgVhWX0qa7RWGzc1VNytQjTWKlQbVCu95UXWKf0dbBmJZ9X487iGlLxdmOh9ZE5p7G+/qk2OvhjjEwE2qPa7L3pRUW0egewySBL8znOPuUFYwsr8I3rdu57Fd6Nk/MxENxNhMCxoaHKL09R3tMmtFWd7eb1k0/1KW0R+Vj0gSoePEgeiWCe4NfgV87N1oB7/3Hfl/R9xZ7Q/QUr2dG7LhULPHf/a8km77Lubm95cH+AWN4qAnxt3e4VIXIibdpgBBPIAA=="}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scmagazine.com/topic/breach","name":"Breach","slug":"breach","id":"dGVybTo3NDYwMg==","uri":"/topic/breach"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scmagazine.com/topic/government-regulations","name":"Government Regulations","slug":"government-regulations","id":"dGVybTo3NDU5Mg==","uri":"/topic/government-regulations"}]},"sponsor":{"sponsors":[]}}],"title":"Related","hasNextPage":false},"meta":{"uri":"/brief/normalyze-to-be-purchased-by-proofpoint","databaseId":782883,"category":"data-security","title":"Normalyze to be purchased by Proofpoint","created":"2024-10-30T09:16:00.000America/New_York","modified":"2024-10-30T09:20:00.000America/New_York","images":null,"description":"Such an acquisition would facilitate the integration of Normalyze's DSPM technology into Proofpoint's cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts.\n","sponsor":null,"breadcrumb":[{"name":"SC Media","position":0,"item":"https://www.scworld.com/"},{"name":"Data Security","position":1,"item":"https://www.scworld.com/topic/data-security"},{"name":"Normalyze to be purchased by Proofpoint","position":2,"item":"https://www.scworld.com/brief/normalyze-to-be-purchased-by-proofpoint"}],"authors":[{"uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff","email":null,"bio":null,"twitter":null,"facebook":null,"linkedin":null,"headshot":null}}],"authorNames":[{"name":"SC Staff","type":"Person","url":"https://www.scworld.com/contributor/sc-staff"}],"taxonomy":{"category":["data-security"],"brand":["sc-media"],"topic":[],"industry":[],"region":[],"scAwards":[]},"subtypeSlug":"brief","openGraphType":"article","contentType":"editorial","additionalFields":{"isNewsArticle":true,"estimatedReadTime":1,"containsInlineSlot":true,"sponsor":null},"jsonLdImages":["https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg"],"url":"https://www.scworld.com/brief/normalyze-to-be-purchased-by-proofpoint","openGraph":{"url":"https://www.scworld.com/brief/normalyze-to-be-purchased-by-proofpoint","title":"Normalyze to be purchased by Proofpoint","description":"Such an acquisition would facilitate the integration of Normalyze's DSPM technology into Proofpoint's cybersecurity platform, which would bolster sensitive data discovery and classification, risk evaluations and prioritization, and security and compliance issue remediation efforts.\n","locale":"en_US","type":"article","article":{"publishedTime":"2024-10-30T09:16:00.000America/New_York","modifiedTime":"2024-10-30T09:20:00.000America/New_York","authors":["SC Staff"],"tags":["data-security"]},"profile":{"firstName":"SC","lastName":"Staff"},"images":[{"url":"https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg","width":2560,"height":960,"secureUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/02/MicrosoftTeams-image-54-scaled.jpg","alt":"Cybersecurity analyst evaluating cybersecurity data trends, Threat assessment and computing risk metrics for cybersecurity enhancement goals and risk mitigation, Approach for safeguarding digital."}]}},"editorialType":"brief","hideLeaderboard":false,"isPreview":false},"__N_SSG":true},"page":"/editorial/[editorialType]/[slug]","query":{"editorialType":"brief","slug":"normalyze-to-be-purchased-by-proofpoint"},"buildId":"rhWVY8aLc_onZdcTVMCea","isFallback":false,"isExperimentalCompile":false,"dynamicIds":[54906,78812],"gsp":true,"scriptLoader":[]}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10