Boldon James Logo

NATO: Leading The Way With A Common Classification Standard

Reading Time: 2 minutes In my last blog on information-centric security, I talked about the need for information to be classified and protected using a common format. By using a  common format, we can more easily share and protect our information, as well… Read More

Information-Centric Security: Protecting Your Business Fortress From Perimeter to Core

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

Mind The Gap! Bridging The Chasm Between Security And Data Management

Reading Time: 2 minutes The primary reason most organisations look at classifying the data they create and handle is to control access to sensitive information, driven by the need to manage security risk and comply with regulations, such as GDPR. However, this scope… Read More

Why Cathay Pacific Data Breach Should Trigger Talk About Data Classification For Cybersecurity

Reading Time: 2 minutes No matter how small or simple the business, data protection must be a priority and the starting point is data classification. In seeking cybersecurity, we need to make sure we are aligning data protection strategies with the actual threat…. Read More

The 5 W’s of Data Identification and Inventory

Reading Time: 2 minutes Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in… Read More