What are the different types of cyberthreat intelligence?

Cyberthreat intelligence: It’s a growing business (and buzzword) that provides many market opportunities. Consuming threat intelligence data is valuable for organizations to improve their security posture and strengthen their protection, detection and response capabilities. But there are some sharks… Read More

Out-of-the-box Data Classification

Driving data security awareness to transform security culture Data classification is a key component of every successful Data Loss Prevention (DLP) strategy. Just as DLP approaches have matured over time to keep customers ahead of the threats and protected… Read More

Most European organisations not ready for GDPR

A new PAC/CXP Group study finds that only 19 per cent of European organisations are ready for the full roll-out of the General Data Protection Regulation (GDPR). The report “Moving beyond the GDPR” is based on briefings with more… Read More

Facebook woes amplify concerns regarding privacy

Over the last few years, massive data breaches have impacted millions of consumers worldwide, with Equifax, FedEx, Uber, the online travel site Orbitz, and other entities hard hit by cyber thieves. Meanwhile, the Department of Justice and the Federal… Read More

GDPR: How to make sure your business is ready

As of May 25, Europe’s ground-breaking General Data Protection Regulation (GDPR) will take effect, fundamentally changing the way businesses and government agencies deal with personal data. The new law applies equally to any organization that operates in Europe, no… Read More

You will lose data…

You will lose data, if you haven’t already.  That impact of that data loss will vary from innocuous low impact to a highly costly sensitive data-breach, and everything in-between.  Why am I so sure? People are lazy. Yes that… Read More

With GDPR upon us, here’s what the C-Suite needs to know about cybersecurity

The EU General Data Protection Regulation (GDPR) is finally upon us. That means if your organisation handles data on any European citizens, you will need to pay attention. The good news is that the rising profile of cyber-threats over… Read More

NIST SP800-171 (CUI) GSA Inclusion and Proposal Scoring

In an ongoing effort to provide consistent security and dissemination controls for government data flowing through non-federal systems, contractors to the General Services Administration (GSA), both primes and their subs, will soon be expected to adhere to Executive Order… Read More

Boldon James Classifier 3.13

Boldon James adds powerful new classification features to utilise ‘actual’ user intelligence A quick and powerful way to enforce security policy – ensuring you comply with GDPR and other regulations This week Boldon James announced the release of Classifier… Read More

The Supply Chain Challenges of GDPR Compliance

The European Union is preparing to roll out an important new rule this month known as the General Data Protection Regulation, or GDPR, which is intended to strengthen and unify data protection for all people within the EU. The… Read More

The Majority of Australian Data Breaches are Caused by Human Error

It wasn’t long ago that the first breach under the Office of the Australian Information Commissioner’s (OAIC) Privacy Amendment Bill was made public. Now, OAIC is back with their first Quarterly Statistics Report of Notifiable Data Breaches. While the report doesn’t offer… Read More

Data Breaches Are Real – Don’t Be Left Unprotected

2018 – The year of the GDPR, and still, data breaches are occurring at an alarming rate. We started the year with the continuing drama surrounding web services provider, Yahoo. As most will be aware, Yahoo have recently been… Read More

Protecting the Last Mile with End-to-End, Data-Centric Security

As the amount of sensitive information being shared internally across business units and with external third parties grows exponentially, organizations are looking for solutions that will protect documents, wherever they travel, and even while they are being utilized. Traditional… Read More

Why One Size Does Not Fit All

These days we strive for simplicity, we look for the easiest, simplest, and at first glance, cheapest, tools to make our organisations run better with less risk. Let’s take data classification as an example.  A 1,000ft view and it… Read More

The people problem — security’s biggest blind spot

How organisations can turn their biggest security threat — people — into their best security asset. But relying on people as the first and best line of defence requires well-trained professionals and there is a shortage. Sensitive data breaches… Read More

What is DCAP (Data-Centric Audit and Protection)?

A definition of DCAP, how it works, best practices, and more… Enterprises are taking advantage of big data analytics to advance their businesses. With big data arriving, there is also more opportunity for cybercriminals. That’s why companies are increasingly… Read More

GDPR: Effective Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)

Many companies are currently in various phases of projects to comply with the European Union’s General Data Privacy Regulation (GDPR) ahead of the May 2018 enforcement deadline. Many vendors and service providers speak generally about GDPR and often, in… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 3

Following on from part one, and part two of this three part series, this week’s final instalment looks at Third-Party Risk… 3. Third-Party Risk Third parties can present your greatest area of risk exposure — both for data security,… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 2

Following on from part one of this three part series, this week we look at Incident Response… 2. Incident Response Historically, too much IT security spending has focused on the prevention of data breaches, and not enough has gone… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 1

How can organizations that are impacted by these regulations implement the necessary changes for compliance? Three Keys to Success Whether it’s the NY Cybersecurity Requirements, the GDPR or other data protection and privacy regulations, efforts should be focused on… Read More

GDPR: Whose problem is it anyway?

With the GDPR deadline looming on May 25, 2018, every organization in the world that transmits data related to EU citizens is focused on achieving compliance. And for good reason. The ruling carries the most serious financial consequences of… Read More

Boldon James “Channel Sales Person of the Year 2017” Award

We wish to congratulate Dean Collins, of InteliSecure UK, on winning the Boldon James “Channel Sales Person of the Year 2017” award. Paul Johnson, EMEA Vice President of Boldon James presents the Channel Sales Person of the Year 2017… Read More

Dear AutoComplete – It’s not all your fault

I’ve read two examples recently where Outlook AutoComplete has been disabled; one a borough council and the other a large financial institution. In both cases this action has been a reaction to their users sending information externally to the… Read More

8 game-changing data trends that will impact businesses in 2018

The convergence of data management technologies, the increased focus on artificial intelligence (AI), and the implementation of the General Data Protection Regulation (GDPR) will be pivotal data trends that will impact businesses moving into 2018, according to a recent… Read More

Seven reasons to classify your data

The best way to protect and govern your data is to let it tell your business applications and infrastructure what it contains. Chris Farrelly, General Manager at HANDD Business Solutions, explains how that’s possible and why you should do… Read More

GDPR: Dumb Ways to Fail – Part 3

The final installment of the three part series from guest blogger, Toby Stevens, describing how organisations can fail in their GDPR readiness, and how you can avoid the same failures. If you missed part one, or part two of… Read More

GDPR: Dumb Ways to Fail – Part 2

This is part two of a series from guest blogger, Toby Stevens, describing how organisations can fail in their GDPR readiness, and how you can avoid the same failures. If you missed part one, catch up now! 4. Treat… Read More

So, what are your requirements?

“We’re looking for something simple, that’s complicated, easy for our customer care users but with more classifications for the legal team… oh, with headers and footers. Plus a PII option. Can this help with GDPR? What colour should the… Read More

GDPR: Dumb Ways to Fail – Part 1

Most blogs, and information that we see at the moment are, quite rightly, focused on how you should prepare for the GDPR considering how little time there is before the new regulations come into force. However, as always, there… Read More

Confidential Security Files Found On USB In The Street

It has recently been reported that a member of the public found a USB stick on the street that contains about 174 files on Heathrow Airport’s security measures. These files contained information regarding: The route taken by the Queen when… Read More

Boldon James Ltd, Cody Technology Park, Ively Road, Farnborough, Hampshire GU14 0LX, United Kingdom