Select Page
Third Party Vendors

Third Party Vendors

The Achilles Heel of Data Protection Health Share of Oregon, the state’s largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth,...
The Rise of DASB, Sunset your DLP

The Rise of DASB, Sunset your DLP

SecureCircle’s patented Data Access Security Broker (DASB) is the most effective, transparent data security solution. Experience constant data protection and visibility no matter where data is created, modified, stored, and shared. 5 reasons why organizations are...
AWS Source Code Leak

AWS Source Code Leak

On January 13, an AWS employee stole nearly a gigabyte’s worth of data, checking it into a personal GitHub repository. This included data that had already been discovered and classified as “Amazon confidential”. Even worse, the criminal was also able to steal RSA key...
End Source Code Theft

End Source Code Theft

Use Case The Customer A publicly traded Cyber Security Company (CSC) located in Silicon Valley, with 50+ in-house software developers and 100+ contract developers from several 3rd party consulting firms. CSC is also a Gartner Magic Quadrant leader,...
The Rise of DASB, Sunset your DLP

The Rise of DASB

Sunset your DLP Data loss prevention (DLP), the antiquated data protection model, takes a ‘manage by rule’ approach where all data flows freely unless the security team has written a rule to specifically protect the data. Rules come in many forms – discovery and...