Data Loss Prevention Archive

November 7, 2016

Matt Signorello

Is TLS email encryption good enough?

As most people are aware, the need for secure messaging, email encryption or email compliance is on the mind (or should be) of almost all managers inside every business. The need for TLS (Transport Layer Security) can vary from avoiding a data leak, ensuring there are no prying eyes on confidential information or even something… Read More »

September 8, 2016

Monica Hutton

Using Enterprise Encryption – Where Do You Stand?

Earlier this year, Ponemon Institute and Thales e-Security released their 2016 Global Encryption Trends Study.  Conducted since 2005, the study takes a look at how the use of encryption has evolved, where enterprises are at now and the overall impact of encryption on these enterprises’ security. Over 5000 people were surveyed around the world. If… Read More »

September 1, 2016

Bud Walder

Does secure texting even exist?

This headline popped up in the Washington Times last week regarding email encryption: Democrats warned to use encryption weeks before email leaks Interestingly – even though the article references DNC emails that were hacked and exposed by WikiLeaks, it profiles an open source instant messaging app that uses end-to-end encryption advocated by former (and notorious)… Read More »

July 28, 2016

Matt Signorello

IT Guy Perspectives: Mobile Workflows and Risk

At a recent conference, I presented a session that focused on securing mobile workflows and the inherent risk that this can pose to a business. The point of the presentation was to illustrate how going mobile, can actually open up a whole class of issues including productivity, security, policy and overall accessibility for not only… Read More »

June 9, 2016

Pete Cafarchio

Five Salesforce® workflows that put you at risk

If you’re in a regulated industry (Healthcare, financial services, government, etc.) then regulatory compliance applies to the Salesforce workflows that you design and use.  It’s worth taking a closer look at how your data travels to make sure you’re not in violation of HIPAA/HITECH, PCI, FERPA, and the like. The good news is that the… Read More »

January 28, 2016

Matt Signorello

Infected by a virus? Shouldn’t you know better by now?

As a thirty something year-old professional, I have lived through the evolution of the internet.  I started with the Mosaic browser and dial-up, slowly upgrading to 56k and AOL, and then I really got into the heart and soul of “web 1.0” once my first cable modem finally arrived. This is all prior to the… Read More »

January 15, 2016

Andrea Raglione

Once More Unto the Breach: Securing the Digital Perimeter in the Era of State-Sponsored Hacking

Organizations today typically approach data security in the same way that cities historically protected themselves from invading armies: by putting everything of value behind a wall and letting only trusted individuals come inside. This strategy may have worked relatively well in the past, but relying solely on perimeter defenses is an increasingly inadequate approach to… Read More »

January 13, 2016

Andrea Raglione

Defending Your Business from Data Breaches

January 6, 2016

Andrea Raglione

How does an email become compromised?

Email is an inherently insecure protocol. By default, every message sent in plain text is readable whether in transport on the network, or on any of the mail servers that it passes through between sender and recipient. This means any email in plain text can easily be compromised anywhere along its journey across a public… Read More »

December 9, 2015

Andrea Raglione

Navigating The Slippery Slope Of Public Security Disclosure

By Andy Nieto, IT Strategist Previously posted in Dark Reading In talking publicly about cybersecurity, CISOs need to portray capability, strength, and confidence, but without offering critical details that could lead to an attack. Mountain climbers call a narrow ridge with steep drops on both sides an “arête.” Crossing one can be one of the… Read More »

Featured Customers and Partners