The Balancing Act: Education vs Enforcement

Let’s face it – there are very few people in this world who like being told what to do. We often find that suddenly enforcing strict rules and big changes, in both social and working environments, is met with… Read More

Boldon James Uncovered – Data Classification: Driving Operational Success

Paul Johnson, Vice President EMEA at Boldon James, identifies the key stages to achieving operational success in your organisation. The crucial difference between information and data, and the experiences our own clients have faced are just some of the… Read More

What is a Data Classification Policy?

Data classification helps us to categorize data in a way that conveys the sensitivity of information, such as data that must be safeguarded for confidentiality, integrity, and availability. Here’s what you need to know about the importance of data… Read More

New Privacy Laws Require Security Professionals To Up Their Game

Two recent privacy laws — GDPR and the California Consumer Privacy Act (AB-375) – focus more attention on protecting the digital privacy of individuals. Both laws will require security professionals to up their game. In this post I will… Read More

At the Leading Edge of NATO Data Centric Security

For the past 20 years, Boldon James has been leading the way with Military Messaging Handling Systems (MMHS) using Microsoft Exchange as the core messaging service. This has involved supporting the full evolution of NATO STANAG’s (Standard NATO Agreement)… Read More

Your Unstructured Data Is Sexy – You Just Don’t Know It

The challenge in making your unstructured data sexy lies in how you manage it.  In this article, the Headwaters Group share their approach to managing unstructured data in a way that reduces the cost of storing and protecting data, consolidates… Read More

The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in… Read More

Tesla Data Theft Case Illustrates the Danger of the Insider Threat

Tesla filed a lawsuit against a former employee this week after it learned he made changes to company source code and exported gigabytes of proprietary data to unknown third parties. Tesla CEO and business magnate Elon Musk learned a… Read More

What are the different types of cyberthreat intelligence?

Cyberthreat intelligence: It’s a growing business (and buzzword) that provides many market opportunities. Consuming threat intelligence data is valuable for organizations to improve their security posture and strengthen their protection, detection and response capabilities. But there are some sharks… Read More

Out-of-the-box Data Classification

Driving data security awareness to transform security culture Data classification is a key component of every successful Data Loss Prevention (DLP) strategy. Just as DLP approaches have matured over time to keep customers ahead of the threats and protected… Read More

Most European organisations not ready for GDPR

A new PAC/CXP Group study finds that only 19 per cent of European organisations are ready for the full roll-out of the General Data Protection Regulation (GDPR). The report “Moving beyond the GDPR” is based on briefings with more… Read More

Facebook woes amplify concerns regarding privacy

Over the last few years, massive data breaches have impacted millions of consumers worldwide, with Equifax, FedEx, Uber, the online travel site Orbitz, and other entities hard hit by cyber thieves. Meanwhile, the Department of Justice and the Federal… Read More

GDPR: How to make sure your business is ready

As of May 25, Europe’s ground-breaking General Data Protection Regulation (GDPR) will take effect, fundamentally changing the way businesses and government agencies deal with personal data. The new law applies equally to any organization that operates in Europe, no… Read More

You will lose data…

You will lose data, if you haven’t already.  That impact of that data loss will vary from innocuous low impact to a highly costly sensitive data-breach, and everything in-between.  Why am I so sure? People are lazy. Yes that… Read More

With GDPR upon us, here’s what the C-Suite needs to know about cybersecurity

The EU General Data Protection Regulation (GDPR) is finally upon us. That means if your organisation handles data on any European citizens, you will need to pay attention. The good news is that the rising profile of cyber-threats over… Read More

NIST SP800-171 (CUI) GSA Inclusion and Proposal Scoring

In an ongoing effort to provide consistent security and dissemination controls for government data flowing through non-federal systems, contractors to the General Services Administration (GSA), both primes and their subs, will soon be expected to adhere to Executive Order… Read More

Boldon James Classifier 3.13

Boldon James adds powerful new classification features to utilise ‘actual’ user intelligence A quick and powerful way to enforce security policy – ensuring you comply with GDPR and other regulations This week Boldon James announced the release of Classifier… Read More

The Supply Chain Challenges of GDPR Compliance

The European Union is preparing to roll out an important new rule this month known as the General Data Protection Regulation, or GDPR, which is intended to strengthen and unify data protection for all people within the EU. The… Read More

The Majority of Australian Data Breaches are Caused by Human Error

It wasn’t long ago that the first breach under the Office of the Australian Information Commissioner’s (OAIC) Privacy Amendment Bill was made public. Now, OAIC is back with their first Quarterly Statistics Report of Notifiable Data Breaches. While the report doesn’t offer… Read More

Data Breaches Are Real – Don’t Be Left Unprotected

2018 – The year of the GDPR, and still, data breaches are occurring at an alarming rate. We started the year with the continuing drama surrounding web services provider, Yahoo. As most will be aware, Yahoo have recently been… Read More

Protecting the Last Mile with End-to-End, Data-Centric Security

As the amount of sensitive information being shared internally across business units and with external third parties grows exponentially, organizations are looking for solutions that will protect documents, wherever they travel, and even while they are being utilized. Traditional… Read More

Why One Size Does Not Fit All

These days we strive for simplicity, we look for the easiest, simplest, and at first glance, cheapest, tools to make our organisations run better with less risk. Let’s take data classification as an example.  A 1,000ft view and it… Read More

The people problem — security’s biggest blind spot

How organisations can turn their biggest security threat — people — into their best security asset. But relying on people as the first and best line of defence requires well-trained professionals and there is a shortage. Sensitive data breaches… Read More

What is DCAP (Data-Centric Audit and Protection)?

A definition of DCAP, how it works, best practices, and more… Enterprises are taking advantage of big data analytics to advance their businesses. With big data arriving, there is also more opportunity for cybercriminals. That’s why companies are increasingly… Read More

GDPR: Effective Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)

Many companies are currently in various phases of projects to comply with the European Union’s General Data Privacy Regulation (GDPR) ahead of the May 2018 enforcement deadline. Many vendors and service providers speak generally about GDPR and often, in… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 3

Following on from part one, and part two of this three part series, this week’s final instalment looks at Third-Party Risk… 3. Third-Party Risk Third parties can present your greatest area of risk exposure — both for data security,… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 2

Following on from part one of this three part series, this week we look at Incident Response… 2. Incident Response Historically, too much IT security spending has focused on the prevention of data breaches, and not enough has gone… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 1

How can organizations that are impacted by these regulations implement the necessary changes for compliance? Three Keys to Success Whether it’s the NY Cybersecurity Requirements, the GDPR or other data protection and privacy regulations, efforts should be focused on… Read More

GDPR: Whose problem is it anyway?

With the GDPR deadline looming on May 25, 2018, every organization in the world that transmits data related to EU citizens is focused on achieving compliance. And for good reason. The ruling carries the most serious financial consequences of… Read More

Boldon James “Channel Sales Person of the Year 2017” Award

We wish to congratulate Dean Collins, of InteliSecure UK, on winning the Boldon James “Channel Sales Person of the Year 2017” award. Paul Johnson, EMEA Vice President of Boldon James presents the Channel Sales Person of the Year 2017… Read More

Boldon James Ltd, Cody Technology Park, Ively Road, Farnborough, Hampshire GU14 0LX, United Kingdom