Boldon James - HelpSystems Company Logo

New Privacy Laws Require Security Professionals To Up Their Game

Reading Time: 3 minutes Two recent privacy laws — GDPR and the California Consumer Privacy Act (AB-375) – focus more attention on protecting the digital privacy of individuals. Both laws will require security professionals to up their game. In this post I will… Read More

Your Unstructured Data Is Sexy – You Just Don’t Know It

Reading Time: 4 minutes The challenge in making your unstructured data sexy lies in how you manage it.  In this article, the Headwaters Group share their approach to managing unstructured data in a way that reduces the cost of storing and protecting data, consolidates… Read More

The 5 W’s of Data Identification and Inventory

Reading Time: 2 minutes Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in… Read More

Tesla Data Theft Case Illustrates the Danger of the Insider Threat

Reading Time: 3 minutes Tesla filed a lawsuit against a former employee this week after it learned he made changes to company source code and exported gigabytes of proprietary data to unknown third parties. Tesla CEO and business magnate Elon Musk learned a… Read More

What are the different types of cyberthreat intelligence?

Reading Time: 6 minutes Cyberthreat intelligence: It’s a growing business (and buzzword) that provides many market opportunities. Consuming threat intelligence data is valuable for organizations to improve their security posture and strengthen their protection, detection and response capabilities. But there are some sharks… Read More