Equifax submits statement to congressional committees regarding cybersecurity incidient

Equifax Submits Additional Statements to Congress Regarding the Incident Equifax submitted a statement to congressional committees to supplement the company’s responses regarding the extent of the incident impacting U.S. consumers.  “As announced on September 7, 2017, the information stolen by the attackers primarily included: “As a result of its analysis of the [...]

Read More

DLP is Still Going Strong

  DLP, THE ANALYSTS AND VENDORS A blog: For nearly two decades, deploying Data Loss Prevention (DLP) has been a staple for enterprises seeking to secure their data assets. Despite being such an important part of an information security strategy, some observers have recently begun to cast doubt on the [...]

Read More

Intelligent Technologies for EU GDPR

Intelligent Technologies for EU GDPR With the long anticipated General Data Protection Regulations (GDPR) of the European Union coming into effect in May, companies across the globe are scrambling to insure their data management systems are ready for the new responsibility. GDPR presents a tall order for firms that want [...]

Read More

The Cost of BIPA Non Compliance is High

The Cost of BIPA Non Compliance is High The floodgate of lawsuits being brought in the State of Illinois over improper storage of biometric data has continued over the past several months, pretty much unabated. Illinois’ Biometric Information Privacy Act (BIPA) has proven to be one of the more  consequential [...]

Read More

Continuous Risk and Trust Assessment Approach

Continuous Risk and Trust Assessment Approach The industry standards in information security have been undergoing dramatic changes over the past several years.  So what is the Continuous Risk and Trust Assessment Approach? The paradigm of network security monitoring has firmly shifted from a rigid, concretized approach, to one the focuses [...]

Read More

DFARS / NIST 800-171 Compliant

DFARS / NIST 800-171 Compliant Preventing the loss of sensitive information is one of the biggest challenges facing organizations in their day-to-day operations. Data loss prevention techniques are vital for establishing secure protocols. It is not surprising that the National Institute of Standards and Technology (NIST) in their last special [...]

Read More

Edge Computing, IoT and Data Breaches

Edge Computing, IoT and Data Breaches In the era of high demand on data storage and organization, one of the most employed methods by firms to consolidate resources is edge computing. Edge computing is a method of optimizing cloud computing systems by performing data processing at the “edge”, the logical fringes of [...]

Read More

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital role in an organization’s information security strategy. DLP is essential for tracking a company’s volume of data and organizing it within security protocols. This includes classifying files / data streams [...]

Read More

The Failings of Blanket Encryption

The Failings of Blanket Encryption As the rate and severity of data breaches increase, industry leaders in the IT sector have sought more all-encompassing measures to safeguard sensitive information stored on company systems. Many have identified the lack of blanket encryption for company files to be the primary cause of [...]

Read More

Insider Threats, preventing data exfiltration

Insider Threats, preventing data exfiltration The digital economy is undergoing remarkable transformation and security is being compelled to evolve as organizations embrace services that are more dynamic in nature. The things organizations do to grow, innovate, and drive performance change the cyber risk landscape every day. Business leaders today are [...]

Read More

Which DLP Solution are you using?

Which DLP Solution are you using? Sound familiar? Many organizations are now being required to discuss with their customers which DLP solution they have in place and how effective the solution is. Healthcare Organizations, Defense Contractors, Financial Firms and the like, are now requiring most of their 3rd party service providers (including [...]

Read More

A Zero Trust Approach towards Data Protection

Using a Zero Trust Approach towards Data Protection and Data Exfiltration Prevention   What is Zero Trust Security? Face it, traditional network perimeter security (firewalls, IDS, and the like) have failed.  Add into the mix the growth of cloud services (both sanctioned and unsanctioned) and you have a big problem.  Zero [...]

Read More

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready?

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready? May 11, 2017 Section 1 c (ii) of the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, where the Executive Order mandates that the NIST Cybersecurity Framework [...]

Read More
compliance data protection

ICO publishes International Strategy

ICO publishes International Strategy to help protect UK public’s personal information in a global environment 04 July 2017    Latest news from the  UK’s Information Commissioner’s Office (ICO) website The ICO has published its first ever International Strategy to help it meet overseas data protection challenges including increased globalism, changing [...]

Read More

Senate, House Versions of Cyber Hygiene Bill Introduced NIST, FTC, DHS would work together Jun 30, 2017 05:21 AM ET By John Eggerton   eggerton Rep. Anna Eshoo (D-Calif.) has introduced a “cyber hygiene” bill, H.R. 3010, which would require the National Institute of Standards and Technology to come up with [...]

Read More

Europe hit by massive cyberattack

Europe hit by massive cyberattack By Associated Press June 27, 2017 | 11:20am | Updated “PARIS — A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard. Company and government officials reported serious intrusions at the Ukrainian power grid, [...]

Read More
cybersecurity EMC's RSA Data Loss Prevention Suite End-of-Life Announcement

Notable Cybersecurity News

Ohio governor’s website among government sites apparently hacked on Sunday BY ADAM FERRISE, CLEVELAND.COM aferrise@cleveland.com CLEVELAND, Ohio — The Ohio governor’s website was apparently hacked on Sunday, along with the state’s prison system’s website. The official website for Ohio Gov. John Kasich showed the same message from the hacker on [...]

Read More

What is the GDPR Risk Assessment?

What is the GDPR Risk Assessment from GTB Technologies? The GTB Technologies EU GDPR Data Protection Risk Assessment   Organizations are adopting cloud apps at a rapid pace. Whether you allow or block these apps, chances are your users have found a way to access them. With the European Commission [...]

Read More
GTB Technologies Market Leading DLP Platform

What is Data Encryption and Decryption?

  What is Data Encryption and Decryption? Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used. [...]

Read More

Notable Privacy News

Privacy Mandatory – Data Breach Notification in Australia   Australia’s Data Breach Bill amends the Privacy Act 1988 (Cth) (“Privacy Act”) and requires private and public organisations regulated by the Privacy Act to notify affected individuals and the Australian Information Commissioner of “eligible data breaches”. Click the article title to [...]

Read More

GTB Technologies Positioned Furthest for Completeness of Vision in the Visionary Quadrant of Gartner’s Magic Quadrant for Enterprise Data Loss Prevention

5 time Visionary , GTB Technologies positioned furthest for Completeness of Vision, strengths noted as: ” ■   GTB’s combination of data fingerprinting, OCR and native SSL decryption provides powerful interception capabilities, particularly for intellectual property protection use cases ■   Customers speak highly of GTB Discovery, which allows for [...]

Read More

Data Protection Opportunities for MSPs

MSPs who take advantage of intelligent cloud-based and on-premises data protection security are better able to protect their clients from the constantly evolving, never ending environment of insider and outsider threats. Some of the necessary data protection security features and facets for true Data Protection include: Preventing data exfiltration from [...]

Read More

Notable GDPR News

Notable GDPR Cybersecurity News Click the article title to continue reading Rethink on bank cybersecurity rules might only follow major bank breach, says expert Banks ‘effectively unregulated on cybersecurity’ 10 Jan 2017 at 10:00, OUT-LAW.COM It might take a major bank to fail as a result of a cyber attack [...]

Read More

Forrester DLP Wave 2016

  New DLP Report to be Released   In a few days, Forrester Research releases its first DLP Wave report in over 6 years. Titled “The Forrester WaveTM: Data Loss Prevention Solutions, Q4 2016″, will offer opinions on many different “DLP” solutions.  Much has changed over the last decade of [...]

Read More
CASB Content Aware EDRM

Three Notable Cybersecurity News Items

Three Notable Cybersecurity News  Items Click the article titles above to continue reading   Cisco job applicants warned of potential mobile site data leak Cisco has emailed users of its mobile careers site, warning of two occasions when their data could have been exposed.   By Chris Duckett | November 4, 2016 — [...]

Read More

The Cloud BYOC Problem for the Enterprise

[spacer]  The BYOC & BYOD Enterprise Problem [spacer] Cloud Services are growing at an exponential rate for both business and personal use. Cloud providers today allow private people (maybe your employees) to create powerful computing environments in the cloud by creating their own machines.  The BYOC (bring your own cloud) Users [...]

Read More

Cloud Architecture: Data Leak Prevention in the Cloud

Cloud Architecture: Data Protection in the Cloud Cloud Computing and Emerging Technologies, Azure, AWS, Google, CASB Cloud Access Security Broker, Software-as-a-Service (SaaS),  SaaS Monitoring Platforms (SMP), Virtualization, Web-Oriented Architecture (WOA), Enterprise Mashup……. These technologies can mean a profound change in the design of an organizations’ infrastructures; permitting large organizations to [...]

Read More

Glass houses and cyber theft

Glass houses and cyber theft Aug 1 2016 12:01 am The theft and leaking of emails from the Democratic National Committee dramatically underscored the national problems of cybersecurity. There really is no assurance of privacy in the cyber realm, and the government must do a better job preventing and dealing [...]

Read More
cybersecurity EMC's RSA Data Loss Prevention Suite End-of-Life Announcement

Importance of Data Loss Prevention for Cybersecurity

The Importance of Data Loss Prevention for Cybersecurity The advent of networked computer systems and the Internet has made a huge impact on the way organizations operate.  Most organizations now use networked computer systems to communicate, collaborate and store a large amount of important information. This information can include confidential customer [...]

Read More

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) On October 6, 2015, the EU’s highest court (ECJ)[1] struck down the Safe Harbor Agreement between the US and the European Commission. Many believe the EU will move forward with the General Data Protection Regulation (GDPR), “The EU General Data Protection Regulation (GDPR) was proposed [...]

Read More
Cloud Security

Why is DLP Failing?

Why is DLP Failing? Capital One, Equifax, Uber, Verizon, Dun and Bradstreet, Scottrade, Anthem, Sony Hacked, data breached.  T-mobile, California DMV, Kroger, Microsoft Exchange …    seems like 2021 is moving in the same direction as 2020, 2019, 2018, 2017, 2016, 2015, 2014, and 2013. When studying these patterns, it’s important to [...]

Read More

Why choose GTB for Data Security or DLP?

 Why choose GTB for Data Security?   Our Products Work, it’s that Simple [spacer] PATENTED, ACCURATE, UNPARALLELED  GTB Technologies is the only Data Protection portfolio of solutions (on-premises, off-premises and everywhere in between including the cloud) which can prevent the loss of data from Malware, Frenemies and trusted insiders by [...]

Read More

DLP Finance Award 2015

Financial Banking Awards 2015: DLP  GTB’s Data Loss Prevention has the ability to detect data loss from different channels with the highest degree of accuracy without any false positives   To help CXOs, CIOs, and CEOs find the right banking technology and provider for their enterprises, CIO Reviews selection panel [...]

Read More

Effective Product Promo Videos

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus vel metus nec sapien elementum aliquet. Suspendisse non dui sit amet est tincidunt volutpat eu non sem. Sed nulla tellus, semper ut vestibulum vitae, efficitur nec massa. Cras consequat velit vitae erat interdum, quis sagittis metus consectetur. Morbi molestie ligula ac [...]

Read More

Gaining Exposure for Your iPhone App

Donec sed odio dui. Donec id elit non mi porta gravida at eget metus. Sed posuere consectetur est at lobortis. Maecenas faucibus mollis interdum. Praesent commodo cursus magna, vel scelerisque nisl consectetur et. Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Morbi leo risus, porta ac consectetur ac, [...]

Read More

Where To Launch Your Startup

Praesent justo nisl, auctor sed sapien ut, mattis consequat massa. Sed posuere consectetur est at lobortis. Maecenas faucibus mollis interdum. Praesent commodo cursus magna, vel scelerisque nisl consectetur et. Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. Donec [...]

Read More

Top Development Frameworks Reviewed

Donec sed odio dui. Donec id elit non mi porta gravida at eget metus. Sed posuere consectetur est at lobortis. Maecenas faucibus mollis interdum. Praesent commodo cursus magna, vel scelerisque nisl consectetur et. Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Morbi leo risus, porta ac consectetur ac, [...]

Read More

A Guide to Stunning Product Photography

Donec sed odio dui. Donec id elit non mi porta gravida at eget metus. Sed posuere consectetur est at lobortis. Maecenas faucibus mollis interdum. Praesent commodo cursus magna, vel scelerisque nisl consectetur et. Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Morbi leo risus, porta ac consectetur ac, [...]

Read More

Attracting Great Talent

Donec sed odio dui. Donec id elit non mi porta gravida at eget metus. Sed posuere consectetur est at lobortis. Maecenas faucibus mollis interdum. Praesent commodo cursus magna, vel scelerisque nisl consectetur et. Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Morbi leo risus, porta ac consectetur ac, [...]

Read More

Sourcing Audio For Your Promo Video

Fusce in pulvinar urna. Maecenas vitae volutpat turpis.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque sed arcu in enim faucibus posuere.Fusce in pulvinar urna. Maecenas vitae volutpat turpis.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque sed arcu in enim faucibus posuere.Fusce in pulvinar urna. Maecenas vitae volutpat turpis.Lorem [...]

Read More

Top 10 Tips For Working From Home

Donec sed odio dui. Donec id elit non mi porta gravida at eget metus. Sed posuere consectetur est at lobortis. Maecenas faucibus mollis interdum. Praesent commodo cursus magna, vel scelerisque nisl consectetur et. Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Morbi leo risus, porta ac consectetur ac, [...]

Read More

Usability Testing: Your Questions Answered

Praesent justo nisl, auctor sed sapien ut, mattis consequat massa. Suspendisse erat lectus, pulvinar nec dapibus non, rhoncus sit amet dolor. Duis consectetur condimentum tempus. Phasellus consequat dignissim fringilla. Aenean eget enim id lectus placerat euismod. Sed venenatis, nisi a accumsan aliquam, ipsum sapien commodo ante, eget dictum nisi quam [...]

Read More
GTB's Data Protection is Transforming Security through Accuracy and Visibility

Support

CUSTOMER & TECHNICAL SUPPORT   With experience that will benefit you in implementing your security and compliance projects, our team of dedicated support engineers and customer service staff are ready to help you. We are known to go above and beyond service levels, helping you bring the greatest value and results [...]

Read More

Inspirational Workspace Ideas

Duis lorem est, vestibulum ac diam euismod, dapibus maximus urna. Donec tempor sodales vulputate. Ut sit amet erat nec lacus scelerisque auctor. Donec enim urna, accumsan auctor porta at, vestibulum vitae eros. Suspendisse egestas varius lobortis. Proin ac egestas nunc. Sed bibendum congue ligula, eu mollis purus lacinia nec. Duis [...]

Read More

Exploring Intuitive UX Design

Phasellus mattis nisl sit amet neque hendrerit, eu vulputate libero sollicitudin. Fusce condimentum maximus dolor. Praesent diam risus, sollicitudin sit amet blandit non, tempor sit amet elit. Nam ac enim dolor.Duis porttitor accumsan orci, a imperdiet sapien semper quis. Cras libero justo, consectetur sit amet ligula id, maximus faucibus nulla. [...]

Read More

How to Maximize Productivity

Phasellus imperdiet tincidunt interdum. Nunc imperdiet nulla quis ultrices rhoncus. Nulla condimentum a mauris in blandit. Morbi ornare odio felis, sed ullamcorper enim dictum eu. Donec aliquet lacus augue, ac rutrum dolor aliquet et. Phasellus in finibus orci, vel feugiat tellus. Nunc sed quam vel lorem tincidunt aliquam.Vestibulum imperdiet augue [...]

Read More

Making the Most of Your Commute

Curabitur laoreet sed lorem id pulvinar. Sed nec nisi velit. Proin ut eleifend metus. Donec elementum massa turpis. Nulla facilisi. Etiam sit amet lacinia augue. Praesent malesuada tellus in nunc dapibus suscipit. Cras non turpis ipsum. Fusce non viverra arcu. Suspendisse vel laoreet velit.Phasellus imperdiet tincidunt interdum. Nunc imperdiet nulla [...]

Read More

DLP & Enterprise DRM / IRM

See the Next DLP and Data Security Platform Disruptions https://gttb.com/wp-content/uploads/2021/02/GTB_Welcome1min.mp4 Secure Information Wherever It Goes Extend Information Security Beyond Your Border with Content Aware Enterprise DRM  GTB TECHNOLOGIES IS THE FIRST TO PROVIDE A FULLY INTEGRATED CONTENT AWARE ENTERPRISE DRM SOLUTION WHICH CAN AUTOMATICALLY APPLY FILE LEVEL ACCESS CONTROLS BASED [...]

Read More