Boldon James Logo

The User-Driven Approach: 3 Main Benefits

Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More

The User-Driven Approach: 3 Main Steps

Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More

User-Driven Security: Transforming People Into Security Assets

Reading Time: 2 minutes Artificial Intelligence, User Behaviour Analytics, Zero-Trust… these are the buzzwords the security industry is currently dominated by. The developments to cyber security technology which have been made over the last few years are incredible, developments that are absolutely essential… Read More

The 5 Steps to Effective Data Classification: Measure and evolve

Reading Time: 2 minutes If you followed the first four steps in this series (Identify, Discover, Classify and Secure), you’ll have successfully secured the organisation’s valuable and confidential information by using data classification and downstream toolsets to enforce the security policy. It’s not… Read More

Submarines Leak: DCNS Data Breach

Reading Time: 2 minutes This week, French shipbuilding firm DCNS has confirmed a “serious” data leak from their organisation, and that national authorities have launched investigations. Over twenty thousand documents detailing combat capability of the French organisation’s Scorpene-class submarines have been leaked, causing… Read More