Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various...
Learn more
Whitepaper
Whitepaper
Why Your Organization Needs Data-centric Security
Data-centric security is an alternative approach towards information protection that has emerged as a direct response to the increasingly obvious failure of traditional measures focusing on...
Learn more
Analyst Chat
Analyst Chat
How to Refine Data like Oil - Data Quality and Integration Solutions
Who has not heard of the statement that "Data is the new Oil". But oil needs to be refined and so does data. The challenge of gathering, integrating, cleansing, improving, and enriching data...
Learn more
Smart Data: The better Big Data – using the Open API Economy concepts to better deal with your data
Blog
Smart Data: The better Big Data – using the Open API Economy concepts to better deal with your data
IT vendors these days are making a lot of noise about “Big Data”. That comes as no surprise, since Big Data allows selling masses of expensive hardware, software, and services. But does it really...
Intention and Attention – how Life Management Platforms can improve Marketing
Blog
Intention and Attention – how Life Management Platforms can improve Marketing
Life Management Platforms will be among the biggest things in IT within the next ten years. They are different from “Personal Data Stores” in the sense of adding what we call “apps” to the data...
Encryption is only as good as the protection of its keys
Blog
Encryption is only as good as the protection of its keys
This morning I received a press release pointing to a blog of John Grimm, who works at Thales e-Security. Thales e-Security is the part of the Thales Group , which specializes in encryption....
Life Management schützt private Daten
Blog
Life Management schützt private Daten
Die Sicherheit und der Schutz der Privatsphäre in sozialen Netzwerken wie Facebook haben insbesondere im letzten Jahr viele Diskussionen verursacht. Aber es geht auch anders! Ein Beweis...
GlobalSign interrupt their Certificate Services and ask Fox-IT to Investigate Alleged Security Breach
Blog
GlobalSign interrupt their Certificate Services and ask Fox-IT to Investigate Alleged Security Breach
Only hours after the individual/group claiming responsibility for the DigiNotar hack had posted on pastebin, that he/they have access to 4 more high profile CAs and had named GlobalSign to be...
The DigiNotar Hack, Black Tulips, Rogue Certificates and what You're not Being Told about PKI and Risk
Blog
The DigiNotar Hack, Black Tulips, Rogue Certificates and what You're not Being Told about PKI and Risk
DigiNotar is a Dutch "Internet Trust Provider" running a Certificate Authority (CA),  selling SSL Certificates and digital signature solutions. DigiNotar had recently been bought by VASCO .  On...
Database Security - a strategic perspective
Blog
Database Security - a strategic perspective
In the recent months I've done a lot of research around database security, talking with vendors like Oracle, IBM (Guardium), Sentrigo (now McAfee), Imperva, Bitkoo, and some others as well as with...
Database Security - a hot topic
Blog
Database Security - a hot topic
During the last few months I've did a lot of research around database security, and some advisory. This market, with the very big player Oracle and its large number of offerings, and IBM as...
The need for a holistic approach to IAM, GRC, DLP, PAM, and IRM
Blog
The need for a holistic approach to IAM, GRC, DLP, PAM, and IRM
IT is very well-known for first its ability to create three-letter acronyms and second the mix-up of different marketing terms, leading to overlapping and sometimes pretty unclear market segments....
Previous
1 2 3 4 5 6 7