Reading Time: 2 minutes In my last blog on information-centric security, I talked about the need for data to be classified and protected using a common format. By using a common format, we can more easily share and protect our information, as well… Read More

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

Reading Time: 2 minutes The term “classification” has been thrown around progressively by software companies that offer related products like data governance and DLP. In some cases, the vendor will define “classification” as the ability to discover and protect data, which is a… Read More

Reading Time: 3 minutes Some may simply associate this time of year with pumpkins, ghosts and ghouls, but it is also European Cyber Security Month (ECSM), the EU’s annual awareness campaign which takes place every year in the month of October. The aim… Read More

Reading Time: 2 minutes The UK’s Information Commissioner stressed in a speech that nearly one year into GDPR, the regulation is at a critical stage. There have been tremendous strides in data protection since the implementation of the General Data Protection Regulation last… Read More