Data Protection


Why reinvent the wheel? Leverage existing investments in data security with a difference

CISOs are increasingly investing in robust data security solutions, such as DLP, assuming that their organization’s data will be perfectly secure. Most DLPs are content-based solutions that function based on key words. While it might seem secure, they could lead to complications, such as ‘false positives’ and ‘false negatives’, maybe even leading to permitted data being blocked and unauthorized data passing through the security filter.


Students should take risks when getting into jobs & aspire for IT security experience: Dr. Kromer

“Students should take risks and join smaller companies as they offer much wider and deeper experience than enterprise environments,” says Dr. Heiner Kromer, Chairman, SECUDE, in his key note address at the inauguration of the IT Security Department at the University of Luzern, Switzerland, on 22nd February 2018. Here is the transcript of his presentation.


Securing communication in a non-VPN China

In January 2017, Chinese President Xi Jinping ordered the Internet to be cleansed of free VPN access by March 2018. Going by the progress of things in the country, they are ready to impose the ban by the end of February. In such a scenario, how can companies secure data in China?


How do you secure data against Industrial Espionage?

Intel, recently, admitted that the majority of processors running in all devices have an inherent weakness making them susceptible to espionage. This isn’t surprising as embedded electronic espionage has been in vogue since World War 2. However the key question that businesses need to ask is: Can data be protected?


Context-aware Data Loss Prevention

In contrast to content-based Data Loss Prevention (DPL) software, context-aware DLP solutions have the ability to discern the context of the data flow (to and from) and the user. Thereby they enable CISOs to leverage existing investments in SAP data security.


Data security in times of SAP S/4HANA

In an interview with the E-3 magazine, Andreas Opfer and Holger Huegel describe how companies can leverage the architectural changes that are associated with SAP S / 4 HANA in order to raise the data security level.


Do you have Microsoft Azure Information Protection? What stops you from using it?

Does your organization use Microsoft Azure Information Protection to protect critical documentation and files? Do all your employees use it effectively? What stops them? Is it because they feel that the extra effort of applying a protective layer hampers their workflow? Too many questions, right? Here is a solution.


5 steps to implement a successful data classification policy

Many organizations recognize that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into everyday business activities. However, many companies fail to identify the sensitive of data they are trying to protect.