It is a fact that no one likes to talk about. Swiss companies are spied upon, their secrets revealed and their data sold. The damage can be humongous. There are many cases that remain under lock and key and rarely appear in the media.
No crime is perfect. Every thief leaves behind a ‘signature’ – even in the digital world. But what if he tries to erase it and leave no trace behind? Can it be done? Is there a way to make sure that footprints cannot be erased? This is what Dr. Heiner Kromer has to say.
What stops senior management from seriously considering data-centric security as an important aspect of their overall IT security paradigm? Are they misled? Or is it plain complacency that data breach would happen to them? This is what Dr. Heiner Kromer, CEO, SECUDE has to say.
Marriott, Facebook, Instagram, First American Financial Corp, Capital One, Zoll Medical, Georgia Tech, Federal Emergency Management Agency (FEMA), and others. What’s common to them all? Well, they are all in the 2019 Data Loss Hall of Shame.
“HALOCORE provides effective classification and protection of sensitive data by controlling SAP exports and encrypting extracted documents… Deploying HALOCORE at Microsoft helps us keep our company more secure and compliant,” says Shalini Gupta, Principal Privacy Lead at Microsoft. Read the brief case study to know more.
It now known to the entire world, and not just Facebook users, that data of over 50 million accounts have been misused in direct violation of agreed terms between the Social Media giant and ‘integrated’ third-party applications. This could have been avoided had proper ‘safeguards’ been taken.
McAfee and the Center for Strategic and International Studies recently published a report titled ‘Economic Impact of Cybercrime – No Slowing Down’. The report categorically states the scary real world scenario of increasing cybercrime, often by governments and government sponsored actors.
Digital transformation has catalyzed a significant shift in application integration and data distribution models. To effectively protect intellectual property and personal data, and thus, to meet the requirements of the new European Data Security regulation – GDPR, new solutions need to be considered.