Business

Data Exfiltration, Part 2: Who’s After Your Data?

Welcome to the second episode of our data exfiltration blog series. We’ll be taking a close look at the innocent and not-so-innocent actors who compromise your valuable corporate assets (no, we’re not talking about the Hollywood variety!). We’ll take a look at both external actors and internal actors and show what roles they play in …

Business

Data Exfiltration: The Who, What, Why, Where, and How

Call it what you will—data loss, data leakage, or data breach—theft of valuable corporate information assets has indisputably become a pervasive global problem. Many security professionals in every sector have had the misfortune of experiencing at least one data breach. According to a recent McAfee study, the security pros we interviewed encountered an average of …

Business

Is Your Data Phishing Bait for Hackers?

Data makes the world go round. Without data we wouldn’t be able to successfully run our companies, gain customer insights, increase profits, and continue to innovate. In a world of hackers who are always on the prowl, however, data has the potential to turn from gold to kryptonite. When data falls into the wrong hands …

Business

Embrace and Secure Shadow IT

“Shadow IT” is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective on the job. But the problem is these well-intentioned, hardworking employees are …

Business

The Two Faces of Your Favorite Apps

Online applications have taken over a significant portion of our lives, for better or worse. We spend time in browsers and mobile apps, both for leisure and productivity on a daily basis. Think about the last time you watched a video on YouTube. Was it last week, yesterday, or 15 minutes ago? Cloud-based storage and …

Business

Clicking Without Thinking

We feel safe checking our email anytime, anywhere. But should we? As cybercriminals find their way into every nook and cranny of our online activity, it’s important to evaluate our inbox’s security – on every device. Throughout the globe, more people are accessing email via smartphone than ever before. In the United States alone, 75% …

Business

Securing Cloud Applications – Analysts Weigh In

From July 29 to August 1st, technology research firm Gartner hosted their annual Catalyst conference, an event focused on topics ranging from identity and access management, to mobile devices and cloud computing, all aimed at the IT professional. While at the conference, I had a chance to attend several excellent sessions with in-depth technical focus. …

Business

Taking Control Of Your Data In The Cloud

Who has access to my online data? What measures are being taken to protect it? What can I do to make sure it doesn’t end up in the wrong hands? The concerns behind these questions are rooted in our desire to maintain control over that which is valuable – a natural instinct. Placing data in the hands …