Enterprises Must Take Insider Threats More Seriously

Reading Time: 4 minutes Security teams need to consider the possibility of internal as well as external threats While high-profile cybersecurity breaches originating from malicious insiders are on the rise, many cybersecurity professionals continue to focus exclusively on external threats, forgetting that a… Read More

Mind The Gap! Bridging The Chasm Between Security And Data Management

Reading Time: 2 minutes The primary reason most organisations look at classifying the data they create and handle is to control access to sensitive information, driven by the need to manage security risk and comply with regulations, such as GDPR. However, this scope… Read More

Time To Review Your Corporate Data Policy?

Reading Time: 3 minutes Many organizations continue outdated practices that don’t consider the rapidly changing world of data governance. Outdated agreements and poorly devised classification policies are signs that it’s time for an overhaul; especially considering emerging technologies like the use of mobile… Read More

Out-of-the-box Data Classification

Reading Time: 2 minutes Driving data security awareness to transform security culture Data classification is a key component of every successful Data Loss Prevention (DLP) strategy. Just as DLP approaches have matured over time to keep customers ahead of the threats and protected… Read More

The people problem — security’s biggest blind spot

Reading Time: 3 minutes How organisations can turn their biggest security threat — people — into their best security asset. But relying on people as the first and best line of defence requires well-trained professionals and there is a shortage. Sensitive data breaches… Read More