Boldon James Logo

NATO: Leading The Way With A Common Classification Standard

Reading Time: 2 minutes In my last blog on information-centric security, I talked about the need for information to be classified and protected using a common format. By using a  common format, we can more easily share and protect our information, as well… Read More

Information-Centric Security: Protecting Your Business Fortress From Perimeter to Core

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

When Classification Really Means Classification

Reading Time: 2 minutes The term “classification” has been thrown around progressively by software companies that offer related products like data governance and DLP.  In some cases, the vendor will define “classification” as the ability to discover and protect data, which is a… Read More

The User-Driven Approach: 3 Main Benefits

Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More

The User-Driven Approach: 3 Main Steps

Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More