Data is the new currency.
Start securing it accordingly.
- Cloud Computing
- How To
This article on data-centric security was originally published by Rob Sloan in the WSJ Pro Cybersecurity newsletter. Most organizations accept it is only a matter of time before they suffer a damaging cyber attack. Businesses constantly seek to balance convenience and security, allowing the business to function while protecting critical data assets. Protecting information from […]
It’s a classic information security fallacy: If you think you have complete control over your sensitive intellectual property, you’re wrong. And, if you think you have partial control of that data, you’re still wrong. It’s playing out again in the world of tech giants. Earlier this year, an accidentally cc’d email lead to a shocking […]
Before I joined the security world, I was a lead product engineer for one of the largest consumer product manufacturers in the country. Since manufacturers hold more than 80% of U.S. patents, confidentiality was everything. But here’s the reality: our core designs were never truly secure or confidential. Each new technical employee received carte-blanche access […]
As the biggest night in Hollywood approaches and the industry’s biggest stars prepare to enter the Dolby Theater on February 26th, the security industry held its own rendition of the Academy Awards at the 21st Annual SC Awards, honoring the most innovative information security technologies for 2017. The SC Awards are a huge opportunity for […]