Tag: Data Loss

16
Jul

What is the first step towards data-centric security?

What is the first step towards data-centric security? In the chaotic world of data security, what is the first, and most important, step organizations should take towards data-centric security? The haunting continues… Facebook is back in the limelight and for the same reason – for the social media company’s handling of user data. You will recall that its data was

Read more

Read more

5
Jul

Big Data + Small Gaps = Big Trouble

Data is the new oil. This may sound cliché, but there is no denying the fact that since the middle of the 20th century, the application of data to power businesses has been consistently growing across all industries – finance, healthcare, manufacturing, energy and resources, automobiles and aviation, logistics, entertainment, sports, and so on. Consequently, business concepts focused on data were developed, too. Today, we talk of Big Data and associated terms such as the Internet of Things, Machine-to-Machine Communication, Artificial Intelligence, and Machine Learning. These once awe-inspiring terminologies have now become common jargons in our everyday conversations.

Read more

18
Jun

Protecting IP of a Manufacturing Company – A Case Study

IP is the crown jewel of any organization. Protecting it goes beyond traditional security paradigms. Here is the case study of a leading Swiss chip manufacturer who took the extra step of taking a data-centric approach beyond the standard security paradigm.

Read more

12
Jun

Five SAP data protection scenarios where HALOCORE must be considered

Five SAP data protection scenarios where HALOCORE must be considered An ERP, such as SAP, is ubiquitous and all-encompassing. The key value of such a platform is its ability to power operations across departments by enabling seamless data sharing. However, data that is being shared may also be misused and stolen. Here are five SAP data protection scenarios where HALOCORE

Read more

Read more

4
Jun

Five Types of Insiders who may steal your Company’s Data

Most CIOs and data security practitioners believe that traditional security measures such as firewalls, anti-virus and even password best practices are credible protection against data leaks and theft. The fact is that they are not – especially when the root of the problem could be the employee himself.

Read more

23
Feb

How not to give business to the business of cyber crime

McAfee and the Center for Strategic and International Studies recently published a report titled ‘Economic Impact of Cybercrime – No Slowing Down’. The report categorically states the scary real world scenario of increasing cybercrime, often by governments and government sponsored actors.

Read more

31
Oct

Compromised data is compromised security

The news media recently carried the story of a lost USB stick found on a London street – innocuous enough, except that the stick contained extremely sensitive information on infrastructure security and travel routines of dignitaries, etc. One of the fundamental questions is: Could theft of such information be avoided?

Read more