The Cost of BIPA Non Compliance is High

The Cost of BIPA Non Compliance is High The floodgate of lawsuits being brought in the State of Illinois over improper storage of biometric data has continued over the past several months, pretty much unabated. Illinois’ Biometric Information Privacy Act (BIPA) has proven to be one of the more  consequential [...]

Read More

Continuous Risk and Trust Assessment Approach

Continuous Risk and Trust Assessment Approach The industry standards in information security have been undergoing dramatic changes over the past several years.  So what is the Continuous Risk and Trust Assessment Approach? The paradigm of network security monitoring has firmly shifted from a rigid, concretized approach, to one the focuses [...]

Read More

DFARS / NIST 800-171 Compliant

DFARS / NIST 800-171 Compliant Preventing the loss of sensitive information is one of the biggest challenges facing organizations in their day-to-day operations. Data loss prevention techniques are vital for establishing secure protocols. It is not surprising that the National Institute of Standards and Technology (NIST) in their last special [...]

Read More

Edge Computing, IoT and Data Breaches

Edge Computing, IoT and Data Breaches In the era of high demand on data storage and organization, one of the most employed methods by firms to consolidate resources is edge computing. Edge computing is a method of optimizing cloud computing systems by performing data processing at the “edge”, the logical fringes of [...]

Read More

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital role in an organization’s information security strategy. DLP is essential for tracking a company’s volume of data and organizing it within security protocols. This includes classifying files / data streams [...]

Read More

The Failings of Blanket Encryption

The Failings of Blanket Encryption As the rate and severity of data breaches increase, industry leaders in the IT sector have sought more all-encompassing measures to safeguard sensitive information stored on company systems. Many have identified the lack of blanket encryption for company files to be the primary cause of [...]

Read More

Insider Threats, preventing data exfiltration

Insider Threats, preventing data exfiltration The digital economy is undergoing remarkable transformation and security is being compelled to evolve as organizations embrace services that are more dynamic in nature. The things organizations do to grow, innovate, and drive performance change the cyber risk landscape every day. Business leaders today are [...]

Read More

Which DLP Solution are you using?

Which DLP Solution are you using? Sound familiar? Many organizations are now being required to discuss with their customers which DLP solution they have in place and how effective the solution is. Healthcare Organizations, Defense Contractors, Financial Firms and the like, are now requiring most of their 3rd party service providers (including [...]

Read More

A Zero Trust Approach towards Data Protection

Using a Zero Trust Approach towards Data Protection and Data Exfiltration Prevention   What is Zero Trust Security? Face it, traditional network perimeter security (firewalls, IDS, and the like) have failed.  Add into the mix the growth of cloud services (both sanctioned and unsanctioned) and you have a big problem.  Zero [...]

Read More

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready?

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready? May 11, 2017 Section 1 c (ii) of the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, where the Executive Order mandates that the NIST Cybersecurity Framework [...]

Read More
compliance data protection

ICO publishes International Strategy

ICO publishes International Strategy to help protect UK public’s personal information in a global environment 04 July 2017    Latest news from the  UK’s Information Commissioner’s Office (ICO) website The ICO has published its first ever International Strategy to help it meet overseas data protection challenges including increased globalism, changing [...]

Read More

Senate, House Versions of Cyber Hygiene Bill Introduced NIST, FTC, DHS would work together Jun 30, 2017 05:21 AM ET By John Eggerton   eggerton Rep. Anna Eshoo (D-Calif.) has introduced a “cyber hygiene” bill, H.R. 3010, which would require the National Institute of Standards and Technology to come up with [...]

Read More

Europe hit by massive cyberattack

Europe hit by massive cyberattack By Associated Press June 27, 2017 | 11:20am | Updated “PARIS — A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard. Company and government officials reported serious intrusions at the Ukrainian power grid, [...]

Read More
cybersecurity EMC's RSA Data Loss Prevention Suite End-of-Life Announcement

Notable Cybersecurity News

Ohio governor’s website among government sites apparently hacked on Sunday BY ADAM FERRISE, CLEVELAND.COM aferrise@cleveland.com CLEVELAND, Ohio — The Ohio governor’s website was apparently hacked on Sunday, along with the state’s prison system’s website. The official website for Ohio Gov. John Kasich showed the same message from the hacker on [...]

Read More

What is the GDPR Risk Assessment?

What is the GDPR Risk Assessment from GTB Technologies? The GTB Technologies EU GDPR Data Protection Risk Assessment   Organizations are adopting cloud apps at a rapid pace. Whether you allow or block these apps, chances are your users have found a way to access them. With the European Commission [...]

Read More
GTB Technologies Market Leading DLP Platform

What is Data Encryption and Decryption?

  What is Data Encryption and Decryption? Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used. [...]

Read More

Notable Privacy News

Privacy Mandatory – Data Breach Notification in Australia   Australia’s Data Breach Bill amends the Privacy Act 1988 (Cth) (“Privacy Act”) and requires private and public organisations regulated by the Privacy Act to notify affected individuals and the Australian Information Commissioner of “eligible data breaches”. Click the article title to [...]

Read More

GTB Technologies Positioned Furthest for Completeness of Vision in the Visionary Quadrant of Gartner’s Magic Quadrant for Enterprise Data Loss Prevention

5 time Visionary , GTB Technologies positioned furthest for Completeness of Vision, strengths noted as: ” ■   GTB’s combination of data fingerprinting, OCR and native SSL decryption provides powerful interception capabilities, particularly for intellectual property protection use cases ■   Customers speak highly of GTB Discovery, which allows for [...]

Read More

Data Protection Opportunities for MSPs

MSPs who take advantage of intelligent cloud-based and on-premises data protection security are better able to protect their clients from the constantly evolving, never ending environment of insider and outsider threats. Some of the necessary data protection security features and facets for true Data Protection include: Preventing data exfiltration from [...]

Read More

Notable GDPR News

Notable GDPR Cybersecurity News Click the article title to continue reading Rethink on bank cybersecurity rules might only follow major bank breach, says expert Banks ‘effectively unregulated on cybersecurity’ 10 Jan 2017 at 10:00, OUT-LAW.COM It might take a major bank to fail as a result of a cyber attack [...]

Read More