It now known to the entire world, and not just Facebook users, that data of over 50 million accounts have been misused in direct violation of agreed terms between the Social Media giant and ‘integrated’ third-party applications. This could have been avoided had proper ‘safeguards’ been taken.
CISOs are increasingly investing in robust data security solutions, such as DLP, assuming that their organization’s data will be perfectly secure. Most DLPs are content-based solutions that function based on key words. While it might seem secure, they could lead to complications, such as ‘false positives’ and ‘false negatives’, maybe even leading to permitted data being blocked and unauthorized data passing through the security filter.
“Students should take risks and join smaller companies as they offer much wider and deeper experience than enterprise environments,” says Dr. Heiner Kromer, Chairman, SECUDE, in his key note address at the inauguration of the IT Security Department at the University of Luzern, Switzerland, on 22nd February 2018. Here is the transcript of his presentation.
In January 2017, Chinese President Xi Jinping ordered the Internet to be cleansed of free VPN access by March 2018. Going by the progress of things in the country, they are ready to impose the ban by the end of February. In such a scenario, how can companies secure data in China?
Intel, recently, admitted that the majority of processors running in all devices have an inherent weakness making them susceptible to espionage. This isn’t surprising as embedded electronic espionage has been in vogue since World War 2. However the key question that businesses need to ask is: Can data be protected?
SECUDE participated in the NASSCOM-DSCI Annual Information Security Summit 2017 that was held from December 13-15 at The Leela Palace, Gurgaon. If you missed us there, here is brief account of what transpired. And we are interested to talk to you!
In contrast to content-based Data Loss Prevention (DPL) software, context-aware DLP solutions have the ability to discern the context of the data flow (to and from) and the user. Thereby they enable CISOs to leverage existing investments in SAP data security.
Most business processes are not limited to SAP. Sensitive data is exported by users using Microsoft Office applications – a risk that is clearly underestimated. In this article, Holger Hügel (VP, Products and Services), explains inherent risks in data sharing.
Organizations are increasingly going ‘Digital’. But this is not without its due share of challenges, especially when it comes to data security. In this interview with Express Computer, Dola Krishna (Director – Sales) shares his thoughts on solutions that are more robust than standard content-based DLP solutions.
HALOCORE version 4.4 incorporates a special feature that extends protection features to common use cases of SAP Knowledge Provider (KPro) using distributed and local content servers.