Reading Time: 2 minutes All roads lead to Rome, or at least that is what the proverb says, meaning no matter what route you take, you will always end up with the same result. Unfortunately, this isn’t something you can say for sensitive… Read More
Reading Time: 2 minutes In my last blog on information-centric security, I talked about the need for information to be classified and protected using a common format. By using a common format, we can more easily share and protect our information, as well… Read More
Reading Time: < 1 minute Alan Borland, SAFEmail Product Manager at Boldon James, discusses using Microsoft Exchange as a Military Message Handling System.
Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More
Reading Time: 2 minutes The term “classification” has been thrown around progressively by software companies that offer related products like data governance and DLP. In some cases, the vendor will define “classification” as the ability to discover and protect data, which is a… Read More