Safeguarding Intellectual Property with GTB Data Security That Works®: The Power of Real-Time Code Detection

Safeguarding Intellectual Property with Data Security That Works® The Power of Real-Time Code Detection In today’s digital landscape, intellectual property (IP) is one of the most valuable assets a company can possess. From groundbreaking software algorithms to innovative design codes, protecting this IP from unauthorized access and potential theft is [...]

Read More

Data Risk, Intelligence and Insider Threats

Data Risk, Intelligence and the Insider Threat When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with is that of the insider threat. While the term is typically associated with corporate espionage or perhaps disgruntled workers, this threat is mostly not caused [...]

Read More

UBA, ITM and Enterprise DLP

User Behavior Analytics, or UBA, is one of the most important developments in digital data protection to emerge in the past several years. UBA is an advanced cybersecurity process designed to detect insider threats, primarily those connected to targeted attacks, financial fraud, and especially data exfiltration. By analyzing regular patterns [...]

Read More

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to assure IP and [...]

Read More

Dangerous Cyber Attack Techniques Part 2

Dangerous Cyber Attack Techniques Part 2 Password Reuse and Weak Passwords The weak password is far the most common factor resulting in the compromise of networks worldwide   Research has shown than over 80 percent of all data breaches are caused by stolen passwords. And hackers manage to get their [...]

Read More
2019 leader data protection

GDPR and CCPA Update

GDPR and CCPA, An Update A look at the compliance picture 3 months into the international year of privacy Now that we’re a few months into 2019 it’s worth taking another look at the impact of recent sweeping privacy bills, in particular the EU’s General Data Protection (GDPR) regulatory regime, [...]

Read More

Data Security and Source Code Protection

Data Security & Source Code Protection As far as sensitive data goes, few pieces of information rank higher then program source code. Source code is highly sensitive proprietary information, making up the program instructions for any application in their original form. The More Sensitive, the Bigger the Risk For years, [...]

Read More

Addressing Insider Threats with Cybersecurity

IT Technology Our ever expanding IT technology is creating major changes in the way enterprises handle their data. While the expansion and diversification of computation tools has brought tremendous growth to the IT industry–as well as the business that utilize them–the new trends have come with a price. As organizations [...]

Read More

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready?

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready? May 11, 2017 Section 1 c (ii) of the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, where the Executive Order mandates that the NIST Cybersecurity Framework [...]

Read More

Senate, House Versions of Cyber Hygiene Bill Introduced NIST, FTC, DHS would work together Jun 30, 2017 05:21 AM ET By John Eggerton   eggerton Rep. Anna Eshoo (D-Calif.) has introduced a “cyber hygiene” bill, H.R. 3010, which would require the National Institute of Standards and Technology to come up with [...]

Read More

Europe hit by massive cyberattack

Europe hit by massive cyberattack By Associated Press June 27, 2017 | 11:20am | Updated “PARIS — A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard. Company and government officials reported serious intrusions at the Ukrainian power grid, [...]

Read More

What is the GDPR Risk Assessment?

What is the GDPR Risk Assessment from GTB Technologies? The GTB Technologies EU GDPR Data Protection Risk Assessment   Organizations are adopting cloud apps at a rapid pace. Whether you allow or block these apps, chances are your users have found a way to access them. With the European Commission [...]

Read More

Data Protection Opportunities for MSPs

MSPs who take advantage of intelligent cloud-based and on-premises data protection security are better able to protect their clients from the constantly evolving, never ending environment of insider and outsider threats. Some of the necessary data protection security features and facets for true Data Protection include: Preventing data exfiltration from [...]

Read More

Cloud Architecture: Data Leak Prevention in the Cloud

Cloud Architecture: Data Protection in the Cloud Cloud Computing and Emerging Technologies, Azure, AWS, Google, CASB Cloud Access Security Broker, Software-as-a-Service (SaaS),  SaaS Monitoring Platforms (SMP), Virtualization, Web-Oriented Architecture (WOA), Enterprise Mashup……. These technologies can mean a profound change in the design of an organizations’ infrastructures; permitting large organizations to [...]

Read More

Glass houses and cyber theft

Glass houses and cyber theft Aug 1 2016 12:01 am The theft and leaking of emails from the Democratic National Committee dramatically underscored the national problems of cybersecurity. There really is no assurance of privacy in the cyber realm, and the government must do a better job preventing and dealing [...]

Read More
Cloud Security

Why is DLP Failing?

Why is DLP Failing? Capital One, Equifax, Uber, Verizon, Dun and Bradstreet, Scottrade, Anthem, Sony Hacked, data breached.  T-mobile, California DMV, Kroger, Microsoft Exchange …    seems like 2021 is moving in the same direction as 2020, 2019, 2018, 2017, 2016, 2015, 2014, and 2013. When studying these patterns, it’s important to [...]

Read More