admin

21
Oct

5 Ways to Defend Against Supply Chain Cyberattacks

Supply chains make ideal targets for cybercriminals since they hold sensitive data, often have large attack surfaces and are mostly unprotected. Here are five ways that organizations can defend against supply chain cyberattacks.

18
Oct

How HALOCAD addresses Data Security challenges across PLM and Multi-CAD integrations

SECUDE’s HALOCAD DRM now extends data-centric security across PLM and Multi-CAD integrations. It now supports diversified cross platform PLM and Multi-CAD integrations.

14
Oct

September 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

September 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

7
Oct

Do you use SolidWorks? Here’s how you can protect your CAD files leveraging your existing investment in Microsoft

HALOCAD® for SolidWorks extends Microsoft Information Protection (MIP) to protect CAD data files for SolidWorks users from data thefts.

28
Sep

The Implications of Big Tech’s Meeting With Biden

It’s no secret that cybersecurity breaches are a major concern for businesses across all industries, and governments are starting to take notice. On August 25, 2021, the U.S government met with business leaders from some of the tech sector’s giants, including Microsoft, IBM, Apple, and Google.

22
Sep

How SECUDE’s HALOCORE complements Microsoft 365 E5 Compliance for securing sensitive SAP data

Learn how HALOCORE complements Microsoft 365 E5 Compliance to protect sensitive data extracted from SAP systems with intelligent data classification, storage encryption, and fine-grained access policies even outside the SAP environment.

14
Sep

SECUDE Extends Data-centric Security Across PLM and Multi-CAD Integrations

SECUDE, a leading Digital Rights Management (DRM) solutions provider based on Microsoft Azure Information Protection (AIP) today announced that its flagship product HALOCAD® extends data-centric security across PLM and Multi-CAD integrations.

10
Sep

8 Benefits of Implementing a Zero Trust Architecture

Zero Trust is gaining momentum. Organizations implementing Zero Trust architecture witness fewer data breaches. There are several benefits when you implement a Zero Trust Architecture, some are listed in the blog post.

8
Sep

August 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

August 2021 Roundup – Latest News, Trends & Updates around the world in Data Centric Security.

24
Aug

7 Strategies to Keep Business Data Secure

Cyberattacks are on the rise. The growing number of internet-connected devices and the value of business data means cybercriminals have more to gain than ever from breaking into a company’s network. Here are the seven most important cybersecurity tactics for a business to use. Employing them will help keep company data secure.