Third-party risk: it’s the second hop you should fear

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

06/07/18

IBM and thumb drives: epoxy or beacons?

IBM and thumb drives: epoxy or beacons?

Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.

05/14/18

Rights management and the GDPR: users are still in the loop

Rights management and the GDPR: users are still in the loop

Using Information Rights Management (IRM) to manage the General Data Protection Regulation (GDPR).

04/30/18

Best of breed: how secure are you, really?

Best of breed: how secure are you, really?

If everyone claims to be the best, how can we rationally choose what we will deploy?

03/15/18

The life and death of a document: where did it really go?

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

02/07/18

Are you you?

Are you you?

Are insiders really threats or part of the solution?

01/17/18

Load More