Blog

17
Feb

Data theft in Switzerland: One-third of companies have been victims of industrial espionage

It is a fact that no one likes to talk about. Swiss companies are spied upon, their secrets revealed and their data sold. The damage can be humongous. There are many cases that remain under lock and key and rarely appear in the media.

Read more

31
Jan

Management Musings 2: Protecting evidence at the scene of crime

No crime is perfect. Every thief leaves behind a ‘signature’ – even in the digital world. But what if he tries to erase it and leave no trace behind? Can it be done? Is there a way to make sure that footprints cannot be erased? This is what Dr. Heiner Kromer has to say.

Read more

30
Jan

Management Musings 1: Pay attention to all data-centric security

What stops senior management from seriously considering data-centric security as an important aspect of their overall IT security paradigm? Are they misled? Or is it plain complacency that data breach would happen to them? This is what Dr. Heiner Kromer, CEO, SECUDE has to say.

Read more

2
Jan

The Biggest Data Leaks in the Past 15 Years

Marriott, Facebook, Instagram, First American Financial Corp, Capital One, Zoll Medical, Georgia Tech, Federal Emergency Management Agency (FEMA), and others. What’s common to them all? Well, they are all in the 2019 Data Loss Hall of Shame.

Read more

17
Dec

SECUDE gets featured in The Enterprise World Magazine

Organizations are increasingly becoming aware of the need focus on data security. SECUDE, after the sale of its immensely popular Single Sign-On module to SAP, is now gaining the attention of global companies and media for its unique data security products – HALOCORE and HALOCAD. The Enterprise World magazine recently caught up with SECUDE to feature the company in its magazine.

Read more

21
Nov

Data security in the media: A look on what it takes to plug the gaps beyond traditional DLP solutions

The world is slowly, but increasingly, taking cognizance of looking deeper within when it comes to protecting data. CNBC TV18 recently published an article by Utkarsh Morarka on the ‘why’ and ‘how’ of data security. This is SECUDE’s take on the article.

Read more

7
Nov

How to Secure your Design IP in your PLM environment

Design-intensive organizations leverage many types of security solutions to lessen, if not eradicate, loss of design data. While there are many solutions are deemed necessary due to the diversity of sharing systems, file formats, devices and locations, here is one solution that assures lifecycle-long protection of the CAD file – throughout the PLM cycle.

Read more

22
Oct

Do you use PTC Creo? Here’s how you can protect your CAD files leveraging your existing investment in Microsoft.

Product design is a long-winded process that involves multiple levels, applications and, importantly, stakeholders. More often than not, many important stakeholders would be from outside the organization – thus, sharing designs even before being patented may become a necessity. Obviously, design security is paramount. Is there a way to secure your design throughout its lifecycle without any major additional investments?

Read more

7
Oct

Enterprise-level data security: Big picture first; details foremost

Despite the growing complexity of threats that faces enterprises today, data security practitioners need to be agile and keep in mind the bigger threat picture. While this does translate to dynamic response mechanisms and constantly evolving security paradigms, those responsible for data security shouldn’t lose sight of the ‘small’ things, for as they say, the devil is in the details.

Read more

11
Sep

Six Things to do to Get Your Data Stolen

Have you taken all the steps to throw your data into the winds? If not, you should read this blog post. Leaving your data to the wolves isn’t as easy as you think. Here’s why…

Read more