Boldon James Logo

Information-Centric Security: Protecting Your Business Fortress From Perimeter to Core

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

When Classification Really Means Classification

Reading Time: 2 minutes The term “classification” has been thrown around progressively by software companies that offer related products like data governance and DLP.  In some cases, the vendor will define “classification” as the ability to discover and protect data, which is a… Read More

Establish A Data Classification Model For Cloud Encryption

Reading Time: 3 minutes Not all data requires the same level of encryption. Use data classification to gauge your security needs, including for workloads that span on-premises and cloud environments. Data encryption might seem like a given in any IT security strategy, but… Read More

The 5 W’s of Data Identification and Inventory

Reading Time: 2 minutes Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in… Read More

Data Classification: The Bank For Your Data

Reading Time: 3 minutes The implementation of data security software within an organisation is never without its trials – no matter what size the organisation, how much data they hold, or how watertight their security policy is. The thing is, that before you… Read More