Tag: Data Protection

4
Aug

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. “Trust is good but Verification is better”

Log file manipulation is a critical problem that many organizations face. Administrators usually have elevated privileges that allow them to access sensitive data. Learn more about how HALOCHAIN technology can be used to mitigate the risks related to log file manipulations.

26
Jul

Beyond Blockchain: An Introduction to HALOCHAIN

This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, you will get a glimpse of SECUDE’s HALOCHAIN technology (Patent Pending) and how it will revolutionize the digital trading business.

14
Jul

Protecting the Supply Chain in COVID-19

Supply chain cybersecurity is important at all times, but arguably even more so during the COVID-19 crisis. Here are some proactive steps people can take to keep their sensitive supply chain data safe.

9
Jul

Five key points to consider for implementing a successful EDRM Project

The reason enterprise digital rights management (EDRM) finds increased adoption with the enterprise is the technology provides persistent data protection wherever the data travels or exchanged between employees, partners, vendors, and suppliers across the complex supply chains.

28
Jun

The Colonial Pipeline Ransomware Attack: The Fallout and Its Implications

This blog was written by an independent guest blogger. The Colonial Pipeline ransomware attack is one of the most recent and high-profile cybersecurity events affecting a public or private organization. However, what’s most frightening about it is the implications it has for the future of digital technologies.

27
Jun

Security-First: Why It’s Right and What It Means

This blog was written by an independent guest blogger. Security-first, as the name implies, means considering cybersecurity at the center of every business decision. Being security-first is about restructuring your thinking, so cybersecurity is no longer an afterthought.

16
Apr

Is there Life in the Home office after Corona?

Read how the recent corona pandemic has pushed us into a forced home office and how to deal with it through a structured & goal-oriented approach.

17
Dec

Complying with HIPAA – The HALOCORE way

The recent report about an ex-employee’s access to e-PHI data of a leading Colorado-based medical center raises another important question in addition to robust access control: How to protect data that egress an organization’s enterprise landscape?

3
Dec

Hospitality doesn’t pay; Robust data security does: What Marriott should have done at the outset

PII of around 500 million(!) guests at Marriott hotels has been compromised. The cause of this is due to unauthorized access within its network since 2014. Could this have been averted as early as 2010 when it switched to SAP ERP?

9
Oct

Insider threat could be insidious to regional stability

The recent arrest of a BrahMos Aerospace engineer highlights the need for organizations, private and government-run, dealing with sensitive military technologies to up their data security best practices. When it comes to national security, best may not be best enough.