Select Page


Press Releases
Use Cases
December 29, 2019News

Forbes | The Evolution of Data Protection

Data protection solutions are finally evolving to the current state of data: distributed, cloud-centric and always-on. Data used to only exist within the corporate network on devices that never left the physical protection of the...

December 18, 2019Blog

Ransomware stealing data before encrypting

ZDNET reported on a new strain of Zeplin ransomware that steals an organizations data before encrypting it. Zeppelin joins Maze, REvil (Sodinokibi), Snatch, and the now-defunct Merry Christmas ransomware in doing so. Ransomware used to...

December 6, 2019Blog

Insider Threats Infographic

Black Hat Europe 2019 discussed the continuing threat insiders have on organizations. Both malicious and accidental insider threats should be a top priority for all organizations. View some of the highlights in this infographic. Read...

October 8, 2019Blog

New Yorks SHIELD Act

New York’s governor Andrew Cuomo has signed off on the Stop Hacks and Improve Electronic Data Security (SHIELD) Act. This requires businesses to maintain reasonable safeguards for people’s personal information. The definition of a...

September 25, 2019Blog

Insider Threat at Lion Air (Update)

In our last blog post, we discussed the Lion Air data breach, which affected 46 million customers. Lion Air subsidiary, Malindo Air, recently revealed that their data breach was caused by two former contractors.  GoQuo, Malindo...

September 20, 2019Blog

How to Prevent the Lion Air Databreach

Indonesian airline carrier Lion Air experienced a data breach that exposed the records of over 35 million customers. Passport information, home addresses, and phone numbers were posted on data exchange forums. No payment information is...

September 19, 2019News

CIO IT Taiwan | SecureCircle 控管檔案讀取 權不怕合作生變造成洩密

過去幾年,儘管全球資安意識不斷提升,企業 亦不斷添購各類資安防護產品,但都無法有效防堵 資安威脅事件發生,乃至於發生大量商業機密或個 資外洩的事件。然而會造成資料外洩主因,多半源 自於公司內部防護機制不佳,根據統計僅有13%源 自於外部入侵竊取,另外有23%屬於使用者的惡意 行為,剩餘64%則是疏忽或意外造成的洩密 Read full article...

September 6, 2019Blog

How to Prevent the Mastercard Data Breach

90,000 members of Mastercard’s Priceless Specials program had their data stolen and shared online. After discovering the breach, Mastercard suspended the German program and requested that all third party vendors delete program user...

August 13, 2019Blog

How to Prevent the Boeing Data Leak

Last September, a security researcher was able to uncover an unprotected server full of code for Boeing’s 787 and 737 passenger jets. While the server should have been locked, it is clear that this sort of thing should not be happening...

July 10, 2019Blog

The New Federal Data Strategy

The United States government has recently announced that they will be pursuing a new Federal Data Strategy in order to take advantage of the massive amounts of available data. Leveraging this data will allow them to make more informed...

July 6, 2019Blog

Quest Diagnostics and LabCorp in Trouble

Quest Diagnostics recently revealed that about 12 million patients may have had their financial and medical data exposed in a recent breach. This is just the most recent in a string of healthcare data breaches. Its billing collections...

July 3, 2019Blog

Insider Threat in the Air Force

The Problem: Everyone faces the risk of insider threats. Even the Air Force. A couple months ago, police investigated the home of Izaak Vincent Kemp for a marijuana growing operation but ended up finding over 1000 pages of highly...

May 22, 2019Blog

How to Prevent Government Data Breaches

While many companies are experiencing data breaches at an alarming rate, governments must be on high alert as well. The government of Panama just experienced a breach which exposed the PII of about 85% of all of their citizens. With...

May 1, 2019Blog

Availability Bias in Cybersecurity

When presented with too many choices, people can be paralyzed and pick the one that’s most available to them. This can be either the choice they have heard of the most, or the last option they heard. This is due to a psychological...

Load More