Why Does Your Organization Classify Information?

April 9th, 2014

In a recent article on DARKReading, John Sawyer looks at how organizations can make classification work. One of the key points he makes is that organizations that involve their employees from the beginning and who focus on user training and awareness are the ones that are most successful in implementing a classification program: Read the rest of this entry »

Easily Transition from UK GPMS to GSC

April 3rd, 2014

Effective April 2, 2014, the new UK Government Security Classifications (GSC) policy replaces the previous Government Protective Marking Scheme (GPMS). The new policy requires the classification of Her Majesty’s Government (HMG) information assets into one of three types: OFFICIAL, SECRET, and TOP SECRET. This classification scheme, simplified from the previous GPMS seven-level classification scheme, will help ensure that government staff, contractors, and service providers can more easily safeguard information.
Read the rest of this entry »

Getting end-users on board with classification…Dell did it, so can you!

March 25th, 2014

When we’re at various trade shows and events, IT Managers, CIOs and CISOs will often come to us with a similar concern. They can see how involving end users in protecting sensitive information may be a great idea, but they don’t know how they can get several hundred or several thousand employees on board with the idea of classifying information at the desktop. Can it be done? Read the rest of this entry »

Join our upcoming webinars and learn how to better manage and protect your sensitive information

March 20th, 2014

Over the next couple of weeks, TITUS is teaming up with analysts from 451 Research to present two webinars aimed at organizations looking for more effective ways to better protect unstructured information such as emails and documents. Read the rest of this entry »

Control The Data Chaos…With Gum?! Join Us At RSA 2014

February 14th, 2014

In just over a week, the TITUS team will make the trek from snow-covered Ottawa (yay!!) to the (hopefully) warmer and (fingers-crossed) sunnier San Francisco Bay area for our fourth showing at RSA. We’re pumped, primed, and ready to go! Read the rest of this entry »

Welcome 2014…How Will I Protect My Data This Year?!

January 3rd, 2014

Happy New Year! After a few days of food, fun and festivities, we’re now looking ahead to 2014 and what this year will bring. What better way to kick off the New Year than with a look back at some of the highlights of 2013, and a look forward into the data security trends and predictions for the coming year. Read the rest of this entry »

Security is a Business Imperative, Not an IT Task

November 21st, 2013

I’ve noticed a distinct theme throughout a number of different analyst report I’ve recently read  -  that the protection of information and data assets is a business task which needs guidance from the business unit leaders. Take as an example…

As executives see more and more media coverage of data breaches and security incidents, the inevitable question is: “What are we doing to make sure that doesn’t happen to us?”

Contrary to 2012 when privacy responsibility was shifting to an organization-wide accountability, in 2013 it’s falling more onto the security group within enterprises. [It’s] a matter of concern if more and more enterprises deem the security group fully responsible for privacy and regulations. Ensuring privacy requires a union of technology, policy, and culture, and a harmony between many business units from security to legal to HR to employees.

-          Understand the State of Data Security and Privacy: 2013 to 2014 (Forrester)

Read the rest of this entry »

Search:
Delivered by FeedBurner

Follow Us:

Twitter Twitter You Tube You Tube