The Cybersecurity and Infrastructure Security Agency (CISA) has released a new tool that can help organizations mitigate insider threats. Let’s explore more about insider threats and how businesses can leverage this tool to protect themselves from potential insider threats.
It is a fact that no one likes to talk about. Swiss companies are spied upon, their secrets revealed and their data sold. The damage can be humongous. There are many cases that remain under lock and key and rarely appear in the media.
Marriott, Facebook, Instagram, First American Financial Corp, Capital One, Zoll Medical, Georgia Tech, Federal Emergency Management Agency (FEMA), and others. What’s common to them all? Well, they are all in the 2019 Data Loss Hall of Shame.
The world is slowly, but increasingly, taking cognizance of looking deeper within when it comes to protecting data. CNBC TV18 recently published an article by Utkarsh Morarka on the ‘why’ and ‘how’ of data security. This is SECUDE’s take on the article.
Despite the growing complexity of threats that faces enterprises today, data security practitioners need to be agile and keep in mind the bigger threat picture. While this does translate to dynamic response mechanisms and constantly evolving security paradigms, those responsible for data security shouldn’t lose sight of the ‘small’ things, for as they say, the devil is in the details.
Have you taken all the steps to throw your data into the winds? If not, you should read this blog post. Leaving your data to the wolves isn’t as easy as you think. Here’s why…
British Airways, Apple Inc., Tesla… the list just keeps growing. The latest in this infamous line is none other than Google. Recently, former Google engineer Anthony Levandowski was accused of stealing self-driving car project details as he moved on to join Uber
In the world of manufacturing and high-tech companies the most critical IP, like details of either mature products or yet-to-be patented prototypes, is represented as constructional drawings typically stored as CAD files. Cyber-committed CEOs understand that business continuity in digital processes requires new data-centric security strategies. Here are three important points for you to keep in mind when protecting your CAD files.
They know all about you. Your health status. Your financial status. About your family. About your vacations – where you go, what you consume and what you do. All that information just got into the hands of pretty unsavory characters from institutions that you believed would never reveal your data.
Apple recently revealed that its CAD schematics had leaked, spurring it to reduce ‘factory secrecy staff’ and invest in technology. Last year, Tesla had revealed such loss. This needn’t be if organizations take one small, but largely overlooked, step towards CAD file protection. This is what they should do.