Archive for the ‘Classification’ Category

Time to Get Serious about Controlled Unclassified Information

Wednesday, August 26th, 2015

It’s time to start getting serious about Controlled Unclassified Information (CUI) and the implementation of a solution that ensures compliance. It is expected that the 32 Code of Federal Regulations (CFR) 2002 will be completed in the November-December 2015 time frame. With the rules and markings in place, the National Archives and Records Administration (NARA) will release the official Marking Handbook to kick off the phased implementation process.

TITUS Classification software can help any department easily comply with these regulations. By using the TITUS classification and marking solution, organizations can enhance their overall security program and realize the following benefits:
(more…)

Classification and the Millennial Workforce

Wednesday, August 19th, 2015

Being born in the 90’s I am “classified” as a millennial, part of “Generation Y” and fully immersed in the world of technology. The majority of people born after 1990 have grown up with computers and the internet. Most of our online experiences started with the reward of being able to play Neopets or Pokémon on our parents’ work computers, and have evolved into devoting hours every day to YouTube, Twitter and Facebook. I am well versed in the art of quickly replying to a text while browsing through multiple websites and watching TV. That being said, sometimes my multitasking leads to mistakes; there have been a fair number of times when I have accidentally sent the wrong information to the wrong people.

(more…)

Protect Your Intellectual Property: Forrester Playbook Overview

Thursday, August 6th, 2015

Wouldn’t it be great to say there is one product, from one vendor, that can protect all of your data? The reality, however, is that you need a security ecosystem and framework to protect your most valuable data assets. Forrester Research Inc. has developed a Data Security And Privacy Playbook which helps organizations build the framework they need to protect sensitive information. (more…)

Ready for Windows 10

Wednesday, July 29th, 2015

For the past 3 years I have been bouncing between four operating systems on four different devices: my iPhone (iOS), my Nexus tablet (Android) my home PC (Windows 7) and my work PC (Windows 8.1). Today, with the launch of Windows 10, I dare to hope that this user interface nightmare is coming to an end. The device will finally become secondary to continuity, usability and productivity. As Microsoft themselves say: “We believe your experiences should be mobile – not just your devices. Technology should be out of the way and your apps, services and content should move with you across devices, seamlessly and easily.”1 So, how does TITUS fit into the Windows 10 world?

Perfectly. (more…)

Tackle Your Insider Threat: Protect Your Information and Organization

Tuesday, May 12th, 2015

Last week we featured an excellent blog by Mike Osterman, President of Osterman Research, focused on the threat to data security posed by insiders. As the business world gets more mobile and collaborative, the risks that insiders pose to information security increases. With cloud storage apps, thumb drives, and mobile devices that contain a great deal of corporate information but are also easily lost or stolen, your users can leak huge volumes of your critical data quickly – and so far I am just talking about mistakes by good employees. When you consider employees that have gone bad and are stealing information for financial gain, prevention and detection of insider data leaks becomes critical.
(more…)

Policy Tetris

Wednesday, April 8th, 2015

Remember Tetris? Admit it – you’ve wasted hours on Tetris. Well, let me share with you something I like to call “Policy Tetris.”

(more…)

The Internet of Things and Threat Detection

Wednesday, April 1st, 2015

Marshall McLuhan coined the phrase “the medium is the message” in writing about the social impact of technology. While we are watching the content, we miss the transformative impact the medium has on our lives. Just as the simple light bulb forever changed how we live and work, the Internet of Things—embedded in devices from pacemakers to home thermostats—creates a connectedness we could not have imagined just a few years ago. And it makes us simultaneously free and vulnerable.

At its most basic level, the Internet of Things (IoT) is the interconnection of devices and sensors across the Internet – machines talking to other machines about your health, a refrigerator that keeps track of its contents, and a home security system that monitors your comings and goings.

This free flow of information is both exciting and terrifying. (more…)