What is the first step towards data-centric security? In the chaotic world of data security, what is the first, and most important, step organizations should take towards data-centric security? The haunting continues… Facebook is back in the limelight and for the same reason – for the social media company’s handling of user data. You will recall that its data was
Data is the new oil. This may sound cliché, but there is no denying the fact that since the middle of the 20th century, the application of data to power businesses has been consistently growing across all industries – finance, healthcare, manufacturing, energy and resources, automobiles and aviation, logistics, entertainment, sports, and so on. Consequently, business concepts focused on data were developed, too. Today, we talk of Big Data and associated terms such as the Internet of Things, Machine-to-Machine Communication, Artificial Intelligence, and Machine Learning. These once awe-inspiring terminologies have now become common jargons in our everyday conversations.
IP is the crown jewel of any organization. Protecting it goes beyond traditional security paradigms. Here is the case study of a leading Swiss chip manufacturer who took the extra step of taking a data-centric approach beyond the standard security paradigm.
Five SAP data protection scenarios where HALOCORE must be considered An ERP, such as SAP, is ubiquitous and all-encompassing. The key value of such a platform is its ability to power operations across departments by enabling seamless data sharing. However, data that is being shared may also be misused and stolen. Here are five SAP data protection scenarios where HALOCORE
Most CIOs and data security practitioners believe that traditional security measures such as firewalls, anti-virus and even password best practices are credible protection against data leaks and theft. The fact is that they are not – especially when the root of the problem could be the employee himself.
McAfee and the Center for Strategic and International Studies recently published a report titled ‘Economic Impact of Cybercrime – No Slowing Down’. The report categorically states the scary real world scenario of increasing cybercrime, often by governments and government sponsored actors.
The news media recently carried the story of a lost USB stick found on a London street – innocuous enough, except that the stick contained extremely sensitive information on infrastructure security and travel routines of dignitaries, etc. One of the fundamental questions is: Could theft of such information be avoided?