The Different Flavors of the Insider Threat

May 6th, 2015

Insider threats are a serious issue for any organization. In a survey conducted by Osterman Research in February 2015, we found that during the previous 12 months 26% of organizations have had sensitive or confidential information accidentally or maliciously leaked through email, 8% had experienced data leakage through a cloud-based tool, and 5% had experienced it through social media. Adding to the problem of data exfiltration are issues like phishing and malware installed from simple activities like Web surfing or accessing email: the same survey found that 67% of organizations were victims of malware infiltration from a successful email-based phishing attack, while 63% were victims of malware infiltration through employee Web surfing. Read the rest of this entry »

Whirlwind Week for TITUS at RSA 2015

April 29th, 2015

Whew – what a week for TITUS at RSA 2015! Great crowds at the booth, great people, a great team – what more could you ask for!?

IMG_9639
Read the rest of this entry »

Live from RSA 2015 – TITUS Launches Classification Suite 4

April 21st, 2015

RSA 2015 started off with a bang last evening for TITUS. Great crowds at the TITUS booth (1215), and lots of people interested in learning more about our information classifications solutions. Today will be an even bigger day for TITUS at RSA as we officially launch TITUS Classification Suite 4, a significant new release of our flagship data identification and information protection suite. Read the rest of this entry »

Policy Tetris

April 8th, 2015

Remember Tetris? Admit it – you’ve wasted hours on Tetris. Well, let me share with you something I like to call “Policy Tetris.”

Read the rest of this entry »

The Internet of Things and Threat Detection

April 1st, 2015

Marshall McLuhan coined the phrase “the medium is the message” in writing about the social impact of technology. While we are watching the content, we miss the transformative impact the medium has on our lives. Just as the simple light bulb forever changed how we live and work, the Internet of Things—embedded in devices from pacemakers to home thermostats—creates a connectedness we could not have imagined just a few years ago. And it makes us simultaneously free and vulnerable.

At its most basic level, the Internet of Things (IoT) is the interconnection of devices and sensors across the Internet – machines talking to other machines about your health, a refrigerator that keeps track of its contents, and a home security system that monitors your comings and goings.

This free flow of information is both exciting and terrifying. Read the rest of this entry »

What If “Big Brother” Was Watching Your Data?

March 25th, 2015

Edward Snowden was in the news again this month, speaking (via teleconference from Russia of course) at an event hosted by Ryerson University in Toronto, Canada. Apart from the designated topic of classified government documents making their way into public hands, the concept of communications privacy was broached by the famous ‘whistle-blower’.   Mr. Snowden said that he himself avoided any digital communications “for anything that could be considered sensitive just because it’s extremely risky” and framed these thoughts with a series of software tools he recommended to protect the privacy of your data.
Read the rest of this entry »

Do Newborns Really Need a Name? The Top 10 Reasons Organizations are Not Naming Their Data Babies

March 11th, 2015

Think about this…on that special day when we are born our parents give us a name. Makes sense, right? Having a name keeps you from getting mixed up with the other babies. If you are late for supper and your mom needs to find you right away, she calls your entire name just to make sure the right “Mike” comes home. Should you get lost, it would be pretty difficult for your parents to say to police: “Well, he is 7 years old but doesn’t have a name. See if he answers to ‘Steve’. We always liked that name…”

I digress…

Your company’s data isn’t much different, is it? Without a unique identifier your sensitive data is subject to misuse or improper handling. Everything from securing, storing and retrieving your information is much more difficult, time consuming, and less efficient without first properly identifying—or classifying —your data.

Many organizations are beginning to see the value in “naming their data”, or data classification, and are starting to do something about. However, there are still some organizations out there that do not classify their data. Here is a top 10 list of excuses why organizations DO NOT classify their data “babies”.
Read the rest of this entry »

Data Classification Key to Effectively Protecting Information in the Financial Services Industry

March 6th, 2015

For financial services organizations, protecting their customers’ sensitive information is a top priority. When sensitive financial information is breached, fines, lawsuits, and embarrassing headlines are just a few of the many consequences that can occur. Read the rest of this entry »

Search:
Delivered by FeedBurner

Follow Us:

Twitter Twitter You Tube You Tube