1.888.749.9800

News & Events

  • Permalink Gallery

    Security Experts Share Top Tips for Protecting Unstructured Data

Security Experts Share Top Tips for Protecting Unstructured Data

by Nate Lord, Digital Guardian, May 22, 2017

19 security professionals and business leaders share their top tips for protecting unstructured data.

From the contents of emails to intellectual property, business plans, proprietary training documentation, and much more, most enterprises manage vast amounts of unstructured data containing valuable and sensitive information. The sheer volume of unstructured data created and managed by most […]

By |May 23rd, 2017|News & Events|Comments Off on Security Experts Share Top Tips for Protecting Unstructured Data

How to secure data across multiple platforms

by Esther Shein, Contributing Writer, enterprise.net, April 24, 2017

When you adopt cloud services, some of your data is inevitably out of your direct control. Here’s what you need to know.

By now, moving at least some business processes to the cloud is not a question of if but when. So how do you keep your information safe while embracing all […]

By |April 26th, 2017|News & Events, Security Breach, Uncategorized|Comments Off on How to secure data across multiple platforms
  • Permalink Gallery

    US Border Policy Shifts May Drive Changes in Laptop Security

US Border Policy Shifts May Drive Changes in Laptop Security

by Ericka Chickowski, Contributing Writer, Dark Reading, March 31, 2017

In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

The new travel ban enacted by the U.S. Department of Homeland Security for laptops in the cabin of flights from certain countries may have corporate risk managers revisiting policies about […]

By |April 5th, 2017|News & Events, Security Breach|Comments Off on US Border Policy Shifts May Drive Changes in Laptop Security
  • Permalink Gallery

    Hacking of Facebook pages possible, but not probable, experts say

Hacking of Facebook pages possible, but not probable, experts say

by Kayla Canne, Sun Chronicle Staff, March 4, 2017

James Lang, a selectman candidate before he was eliminated in February’s preliminary election, was caught with Facebook posts disparaging Muslims. He apologized, told The Sun Chronicle he would quit the race, and shut down his Facebook page.

Two days later, Selectman Paul Belham was found with anti-Muslim posts on his Facebook page, […]

By |April 4th, 2017|News & Events, Security Breach|Comments Off on Hacking of Facebook pages possible, but not probable, experts say

Firm’s Data Storage Plan Out of This World

by Garrett Reim,  Los Angeles Business Journal, January 27, 2017

INTERNET: Startups look to satellites for higher security.

Cloud Constellation Corp. has a far-flung idea.

As businesses and governments consider ways to protect data in light of increased cyberattacks and surveillance, the startup is offering them a chance to put their information out of reach by storing it on servers within satellites […]

By |February 1st, 2017|News & Events|Comments Off on Firm’s Data Storage Plan Out of This World

How to Secure Intellectual Property from Loss or Compromise

by Nate Lord, Digital Guardian, January 10, 2017

Data Protection experts weigh in with tips on securing intellectual property in its many forms.

Intellectual property is often among an organization’s most valuable assets, yet it’s also vulnerable to threat and compromise, particularly the vast amounts of intellectual property stored electronically today. Intellectual property can take many forms, from general knowledge about […]

By |January 11th, 2017|News & Events|Comments Off on How to Secure Intellectual Property from Loss or Compromise
  • Permalink Gallery

    Want a board-level cybersecurity expert? They’re hard to find

Want a board-level cybersecurity expert? They’re hard to find

by Alan R. Earls, TechTarget, SearchSecurity, November 16, 2016

Members of the board must be ready to defend their fiduciary decisions, corporate policies, compliance actions and, soon, cybersecurity preparedness.

Pity the corporate board. Not that long ago, many boards of directors had a relatively sleepy existence, proffering guidance from time to time, but actually taking action only in the rarest of circumstances.

Nowadays, boards […]

By |November 16th, 2016|News & Events|Comments Off on Want a board-level cybersecurity expert? They’re hard to find
  • Permalink Gallery

    Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

by Josh Fruhlinger, CSO, October 7, 2016

Corporate chaos

The supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea’s Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships’ entry […]

By |October 7th, 2016|News & Events, Security Breach|Comments Off on Down but not out of options: How to keep IT security together in a company that’s gone bankrupt
  • Permalink Gallery

    Cyber Security Investments: Experts Discuss Detection vs. Prevention

Cyber Security Investments: Experts Discuss Detection vs. Prevention

by Nate Lord, Digital Guardian, September 26, 2016

Detection or prevention? 36 security pros and IT experts share their top recommendations for prioritizing security investments.

Enterprises are increasingly aware of the growing need to invest in sound security measures capable of securing valuable company data in the ever-evolving threat landscape. But in the face of budget constraints, some companies find themselves […]

By |September 27th, 2016|News & Events, Security Breach|Comments Off on Cyber Security Investments: Experts Discuss Detection vs. Prevention
  • Permalink Gallery

    A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

by Kim Slowey, Construction DIVE, August 11, 2016

Construction companies are infamous for their reluctance to adopt the latest technologies. Most of the largest companies have made the leap, but for small and mid-sized firms, the process continues inch by inch.

However, as contractors join the digital age and begin to reap the benefits of becoming more connected with fellow […]

By |August 11th, 2016|News & Events, Security Breach|Comments Off on A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

The Brave New World Of Cloud Application Security

by Teresa Meek, Workday Contributor, Forbes, August 3, 2016

As businesses continue their flight to the cloud, their concerns about security are changing. The cloud can offer companies better security than their own data centers — but only if they understand how to manage the responsibilities that come with it.

What Smaller Businesses Can’t Do

For years, security concerns kept companies from migrating their data […]

By |August 4th, 2016|Big Data, News & Events|Comments Off on The Brave New World Of Cloud Application Security

6 ways to reduce Shadow IT security risks

by Joe Stangarone, writer, MRC’s Cup of Joe Blog, July 19, 2016

Summary: A rapidly growing trend, “Shadow IT” is the use of unapproved IT systems and solutions within organizations. End users are increasingly bypassing IT in favor of third party solutions and services. In this article, we explore the security risks of Shadow IT, and a few ways to […]

By |July 19th, 2016|News & Events, Security Breach|Comments Off on 6 ways to reduce Shadow IT security risks
  • Permalink Gallery

    5 important web application security trends of the near future

5 important web application security trends of the near future

by Joe Stangarone, writer, MRC’s Cup of Joe Blog, April 19, 2016

Summary: As security breaches rise, enterprise web application security is an increasingly important topic. You must stay ahead of evolving security trends in order to keep your data and applications safe. How will web application security evolve in the coming year? What web application security threats can we […]

By |April 19th, 2016|News & Events, Security Breach|Comments Off on 5 important web application security trends of the near future
  • Permalink Gallery

    Who Should Be Able to Opt Out of Security Awareness training – and How

Who Should Be Able to Opt Out of Security Awareness training – and How

by Ian Palmer, researcher for InfoSec Institute, March 9, 2016

Brad Johnson is adamant that no one in an organization should be exempt from security awareness training. Not the CEO. Not the chief security officer. Nobody.

Johnson, the vice president of SystemExperts, says that making exceptions on the security awareness training front would only open companies […]

By |March 10th, 2016|News & Events, Security Breach|Comments Off on Who Should Be Able to Opt Out of Security Awareness training – and How

Don’t Neglect the Fundamentals of Identity Management

Posted by Ishan Kumar on 2/11/16 8:52 AM

Paul Hill is a Senior Consultant with SystemExperts. Previously, he worked in the IT Department of the Massachusetts Institute of Technology where he played a leadership role in the evolution of identity services. He is recognized as one of the industry’s foremost experts in Microsoft technology, […]

By |February 15th, 2016|News & Events, Security Breach|Comments Off on Don’t Neglect the Fundamentals of Identity Management