Select Page
Cyber Hygiene

Cyber Hygiene

Washing your hands for 20 seconds is excellent to prevent getting the cold or flu, but what are some cyber hygiene practices businesses can put in place to protect their IT systems and, more importantly, their data. While many SecureCircle customers tend to be larger...
Security risks from employees working from home

Security risks from employees working from home

More employees are working from home and causing additional security challenges. In a recent Wall Street Journal article citing information concerning Apple, “In recent days, software developers sent home by Apple Chief Executive Tim Cook have...
Third Party Vendors

Third Party Vendors

The Achilles Heel of Data Protection Health Share of Oregon, the state’s largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth,...
The Rise of DASB, Sunset your DLP

The Rise of DASB, Sunset your DLP

5 reasons why organizations are switching 1. Manage by exception DASB manages by exception DASB persistently and transparently protects data, with no impact to end-user experience, applications, and business workflows. DASB flips the traditional data protection model...
AWS Source Code Leak

AWS Source Code Leak

On January 13, an AWS employee stole nearly a gigabyte’s worth of data, checking it into a personal GitHub repository. This included data that had already been discovered and classified as “Amazon confidential”. Even worse, the criminal was also able to steal RSA key...
End Source Code Theft

End Source Code Theft

Case Study The Customer A publicly traded Cyber Security Company (CSC) located in Silicon Valley, with 50+ in-house software developers and 100+ contract developers from several 3rd party consulting firms. CSC is also a Gartner Magic Quadrant leader,...