The Public Cloud  Is it Secure?

The Public Cloud.  Is it Secure?   In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store their vital information. Offloading data storage and management has worked wonders. Firms no longer have to rely on in-house storage [...]

Read More

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to assure IP and [...]

Read More

What is Data Loss Prevention Shelfware?

What is Data Loss Prevention (DLP) Shelfware? With the huge volume of sensitive data companies must deal with today, it’s no wonder data loss protection (DLP) still tops the list of administrator concerns. Despite the attention, however, it seems that getting DLP right remains easier said than done. Even major [...]

Read More

Supply Chain Risk and Cybersecurity

Supply Chain Risk: The importance of vetting 3rd party vendors and their data protection tools   Modern organizations are increasingly interconnected, with complex supply chains extending across continents and categories. While this brings a range of business benefits, it also brings risks. Cyber-criminals understand how data is shared between links [...]

Read More

Business Email Compromise

Business Email Compromise   Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list.   Broadly defined, BEC is a type of sophisticated scam targeting companies who conduct wire transfers, especially those with suppliers abroad.   The [...]

Read More

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to [...]

Read More

Air Gap Data Protection

Among all the methods for securing digital data, the policy of air-gaping is certainly the most extreme. Drastic Measures As it’s name would imply, air-gaping is a security protocol that physically isolates a machine from a network.   Air-gaping most commonly involves cutting off a computer from the World Wide Web, [...]

Read More

NIST SP 800-171 CUI Compliance

How to stay compliant with NIST SP 800-171 If you’re part of the US federal government supply chain, at some point you’ll have heard of NIST. The National Institute of Standards and Technology (NIST) sets out data security mandates for government departments and agencies. In 2017 it implemented a sweeping [...]

Read More

Big data, heavy data & DCAP

Big data, heavy data & DCAP With information volumes surging and compliance burdens growing, enterprises need a new approach to data security   By 2025 humans will have generated 180 zettabytes of data [i]– or 180 trillion gigabytes. That’s a lot, and well up from the mere 10 zettabytes we’d [...]

Read More

Dangerous Cyber Attack Techniques Part 2

Dangerous Cyber Attack Techniques Part 2 Password Reuse and Weak Passwords The weak password is far the most common factor resulting in the compromise of networks worldwide   Research has shown than over 80 percent of all data breaches are caused by stolen passwords. And hackers manage to get their [...]

Read More

Inaccuracies of Machine Learning

Inaccuracies of Machine Learning   Automation has found its way into every major technical industry.   And it’s no wonder why.   Streamlining operations with machines increases productivity and efficiency, especially for fields where large volumes of information are a factor.   When it comes to data loss prevention however, [...]

Read More
2019 leader data protection

GDPR and CCPA Update

GDPR and CCPA, An Update A look at the compliance picture 3 months into the international year of privacy Now that we’re a few months into 2019 it’s worth taking another look at the impact of recent sweeping privacy bills, in particular the EU’s General Data Protection (GDPR) regulatory regime, [...]

Read More

Data Security and Source Code Protection

Data Security & Source Code Protection As far as sensitive data goes, few pieces of information rank higher then program source code. Source code is highly sensitive proprietary information, making up the program instructions for any application in their original form. The More Sensitive, the Bigger the Risk For years, [...]

Read More