Data is the new currency.
Start securing it accordingly.

  • Categories:
  • BYOD
  • Cloud Computing
  • Education
  • Engineering
  • How To
  • Industry
  • Security
Countering Insiders with Data-Centric Security
Apr 24 2017

Cyber Matters: Countering Insiders with Data-Centric Security

This article on data-centric security was originally published by Rob Sloan in the WSJ Pro Cybersecurity newsletter. Most organizations accept it is only a matter of time before they suffer a damaging cyber attack. Businesses constantly seek to balance convenience and security, allowing the business to function while protecting critical data assets. Protecting information from […]

Apr 13 2017

Do you know who’s driving away with your IP? You Otto know.

It’s a classic information security fallacy: If you think you have complete control over your sensitive intellectual property, you’re wrong. And, if you think you have partial control of that data, you’re still wrong. It’s playing out again in the world of tech giants. Earlier this year, an accidentally cc’d email lead to a shocking […]

Apr 11 2017

Taking Trade Secrets Home: Cyber Lessons from a Former Product Engineer

Before I joined the security world, I was a lead product engineer for one of the largest consumer product manufacturers in the country. Since manufacturers hold more than 80% of U.S. patents, confidentiality was everything. But here’s the reality: our core designs were never truly secure or confidential. Each new technical employee received carte-blanche access […]

Feb 22 2017

2017 SC Awards: Inside Infosec’s Biggest Night

As the biggest night in Hollywood approaches and the industry’s biggest stars prepare to enter the Dolby Theater on February 26th, the security industry held its own rendition of the Academy Awards at the 21st Annual SC Awards, honoring the most innovative information security technologies for 2017. The SC Awards are a huge opportunity for […]

Load More