Tag: Data Protection


How the Ukraine-Russia Conflict Could Impact Cybersecurity

The cyber warfare of the Ukraine-Russia conflict solidifies what many security experts have been saying for years. Cybersecurity is a matter of national safety, so all organizations must consider it.


Do you use Siemens NX and Solid Edge? Here’s how you can protect your CAD files leveraging your existing investment in Microsoft

Learn how HALOCAD addresses the CAD data security challenges in Solid Edge & NX leveraging your existing investment in Microsoft.


How to protect your sensitive data with automatic classification and labeling

In today’s data-driven environment it is highly important to ensure the security of your sensitive data. Manually protecting data is time consuming and cumbersome. Learn how to automate your data security with HALOCORE® and HALOCAD®


How HALOCAD Reader helps to combat digital security threats in CAD file collaboration

HALOCAD Reader is a free standalone add-on for the native CAD applications to read protected files and always enforce “read-only” privileges for users who have at the minimum, view rights on the protected files.


Will digitalization turn to be a catch-22 for cybersecurity in 2022?

As organizations became increasingly interconnected globally, every business started adapting to the digital model for all their transactions, fearing that otherwise they would be left behind in the race. Unfortunately, this has turned out to be a catch-22 as threats to cybersecurity are continually increasing.


How secure is your UPSI as SEBI tightens its reins on Insider Trading?

SECUDE’s HALOCORE is a unique solution for the protection of sensitive and critical information such as UPSI and other financial data that are exported from SAP. It has a modular structure in order to guarantee effective protection within just a few days of implementation.


How to Address Cultural Change When Implementing a Cybersecurity Program

A company culture that prioritizes cybersecurity goes well beyond annual training sessions. It implements measures to encourage individual employees to utilize best practices for security on all their devices. Learn how to address cultural change when implementing a cybersecurity program.


Will China’s Personal Information Protection Law be a game-changer for data security?

The law which came into effect on 1st November 2021, will provide a legal foundation for the protection of personal information of foreign business operations in China and it will also potentially limit cross-border transfer of critical information due to national security.


The Top Cybersecurity Trends to Watch in 2022

Businesses will need new strategies to respond to the changing cybersecurity threat landscape. These cybersecurity trends are likely to show where the field is moving in 2022 and how businesses should prepare.


SECUDE Security Bulletin on LOG4J vulnerability

A security vulnerability in Apache Log4J a most commonly used logging package for java has been exploited by the hackers. The vulnerability can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.