False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to assure IP and [...]

Read More

Business Email Compromise

Business Email Compromise   Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list.   Broadly defined, BEC is a type of sophisticated scam targeting companies who conduct wire transfers, especially those with suppliers abroad.   The [...]

Read More

Inaccuracies of Machine Learning

Inaccuracies of Machine Learning   Automation has found its way into every major technical industry.   And it’s no wonder why.   Streamlining operations with machines increases productivity and efficiency, especially for fields where large volumes of information are a factor.   When it comes to data loss prevention however, [...]

Read More

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital role in an organization’s information security strategy. DLP is essential for tracking a company’s volume of data and organizing it within security protocols. This includes classifying files / data streams [...]

Read More

GTB’S Vision to the DLP Data Protection Space

GTB’S Vision for the DLP  Data Protection Space From a philosophical standpoint, the main difference between GTB DLP and the others is policymaking.   Good Data Protection / DLP Policy making has many ingredients.   First, is the classification of data. Then, the ability to detect that data followed by [...]

Read More