“Political hack” takes on new meaning in the age of cyberwarfare

“Political hack” takes on new meaning in the age of cyberwarfare

Political hacking is a real and present danger, but more advanced detection and response capabilities will help defend our democratic institutions better than what is current practice.

08/02/18

The ostrich security strategy is now very risky

The ostrich security strategy is now very risky

Ignorance of a serious security event is unreasonable, and just like ignorance of the law, it is no defense.

07/05/18

Third-party risk: it’s the second hop you should fear

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

06/07/18

IBM and thumb drives: epoxy or beacons?

IBM and thumb drives: epoxy or beacons?

Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.

05/14/18

Rights management and the GDPR: users are still in the loop

Rights management and the GDPR: users are still in the loop

Using Information Rights Management (IRM) to manage the General Data Protection Regulation (GDPR).

04/30/18

Best of breed: how secure are you, really?

Best of breed: how secure are you, really?

If everyone claims to be the best, how can we rationally choose what we will deploy?

03/15/18

The life and death of a document: where did it really go?

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

02/07/18

Are you you?

Are you you?

Are insiders really threats or part of the solution?

01/17/18

Load More