November 2020 Roundup – Latest News, Trends & Updates in Data Centric Security
Orchestrating endpoint visibility, authentication, and security enforcement controls are paramount to achieve a Zero Trust compliance. Here are the 7 foundational pillars that organizations must take into consideration while implementing a Zero Trust strategy.
October 2020 Roundup – Latest News, Trends & Updates in Data Centric Security
EDRM is the core data-centric technology for protecting data in today’s collaborative use cases. The EDRM market is gaining traction and the adoption curve shows an upward trend. Here are our six reasons why we think EDRM matters for Data-centric security.
Wipro, the India-based IT giant, is in the news for a major breach of its systems. An advanced phishing attack has enabled hackers, possibly government sponsored, to use Wipro’s network to ‘listen’ to information exchanges with customers and external vendors. Is there a way to thwart data leaks right at the beginning? What should be done?
The innocuous office printer is a seemingly simple corporate device of everyday use. Despite stringent ‘go-green’ and ‘paperless office’ initiatives printing will continue to be. But what comes out needn’t be authorized printed documents. They may also be vital intellectual property or other sensitive information. It’s time IT Managers look beyond mere maintenance issues.
Manufacturing companies create and manage their IP based on CAD drawings that are often shared outside the organization. The risk of losing this IP is significant. Is there a solution to secure your CAD files without any major additional expense? HALOCAD leverages MIP to protect CAD drawings beyond company’s IT landscape.
It is high time that data security practitioners – CIOs, CISOs and, indeed, even business leaders take a long and hard look at their IT security practices. If it does not include data security to a large degree, they have just left their treasure chest wide open.