Boldon James Logo

Classification: do all roads really lead to Rome?

Reading Time: 2 minutes All roads lead to Rome, or at least that is what the proverb says, meaning no matter what route you take, you will always end up with the same result.  Unfortunately, this isn’t something you can say for sensitive… Read More

NATO: Leading The Way With A Common Classification Standard

Reading Time: 2 minutes In my last blog on information-centric security, I talked about the need for information to be classified and protected using a common format. By using a  common format, we can more easily share and protect our information, as well… Read More

Information-Centric Security: Protecting Your Business Fortress From Perimeter to Core

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

When Classification Really Means Classification

Reading Time: 2 minutes The term “classification” has been thrown around progressively by software companies that offer related products like data governance and DLP.  In some cases, the vendor will define “classification” as the ability to discover and protect data, which is a… Read More

The User-Driven Approach: 3 Main Benefits

Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More