Quantcast
Channel: admin – IRM Secure BLOG
Browsing all 45 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The State of Security: It’s Broken

It’s time to move past the hyperbole of next-gen security and look to new approaches that show enterprises how to understand and assess their unique risks. Will 2014 be the year of change for the...

View Article



Image may be NSFW.
Clik here to view.

Federal Judge Rules NSA Metadata Collection is Unconstitutional

In a court ruling, Judge Richard Leon described the agency’s tactics as “almost Orwellian”. A U.S. District Court Judge in Washington ruled that the National Security Agency’s (NSA) bulk collection of...

View Article

Image may be NSFW.
Clik here to view.

Target Credit Card Breach Affects 40 Million Accounts

December 19, 2013 (MINNEAPOLIS) — Target is grappling with a data security nightmare that threatens to drive off holiday shoppers during the company’s busiest time of year. The nation’s second largest...

View Article

Image may be NSFW.
Clik here to view.

What’s The Greatest Security Risk?

While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a study by the Ponemon...

View Article

Image may be NSFW.
Clik here to view.

Social Engineering, Hacking The Human OS

Social engineering, sometimes called the science and art of human hacking, has become quite popular in recent years given the exponential growth of social networks, email and other forms of electronic...

View Article


Image may be NSFW.
Clik here to view.

Trend Micro: One Major Data Breach a Month in 2014?

If you thought this was a bad year in terms of data breaches, wait till 2014 when a major data breach is likely to occur each month. This was one of eight grim predictions for 2014 by security vendor...

View Article

Image may be NSFW.
Clik here to view.

The World’s Most Integration-Friendly IRM System – Now Enhanced For External...

Seclore announced the availability of V 2.46 of its flagship Information Rights Management (IRM) technology – Seclore FileSecure. Building on the core philosophy of being integration-friendly, the new...

View Article

Image may be NSFW.
Clik here to view.

IRM Benefits HR OutSourcing

Outsourcing has become quite common in IT in the recent years, as it enables the company to focus more on their core business. In addition to this, outsourcing provides a better and a cheaper means of...

View Article


Image may be NSFW.
Clik here to view.

Launch of Seclore FileSecure IRM by Red Herring Asia Top 100 company

The Red Herring Asia Top 100 company and financial system integrator, has launched Seclore’s FileSecure information rights management solution in the region. Information rights management is an...

View Article


Image may be NSFW.
Clik here to view.

Bank Cannot Violate a Customer’s Privacy – State Government Order

MUMBAI: The state government has passed strictures against a public sector bank for parting with confidential customer data. “BoB has done absolutely no investigation on its own to find how this...

View Article

IT security overhaul at National Research Council to cost $32.5M

Fortifying the National Research Council’s computer systems in the wake of a high-profile cyber attack last year will cost the federal government $32.5 million. That money, given to the government’s...

View Article

Data Breach At Uber

Statement Uber Statement February 27, 2015 Posted by Katherine Tassi In late 2014, we identified a one-time access of an Uber database by an unauthorized third party. A small percentage of current and...

View Article

UK ranks first in Europe for data breaches

Last year saw more than one billion records compromised thanks to numerous data breaches, claims a recent report, which also found that the UK is at the top of the list when it comes to breaches....

View Article


Technology First

A free magazine and an educational interesting view and read.  More at….. / . IRM Secure is a provider of Information Rights Management solutions. We assist our clients by providing the ability to...

View Article

Are digital loss prevention and signature-based anti-virus living on borrowed...

Fingerprint-based Data Loss Prevention (DLP) and Signature-based Antivirus (AV) have long been security industry mainstays, but with the speed of the business environment outpacing the technology they...

View Article


The top four places your data is at risk

We all worry about protecting our information, but how do we know which activities or locations are most likely to put it in jeopardy? Digital rights management company Seclore has produced an...

View Article

The hidded benefits of data protection: INVESTMENT

We’ve all seen the headlines: “Laptop stolen – thousands of customer records lost” “Malware on Lime Crime website, payment cards compromised” “California Dentist announces theft of server containing...

View Article


Is Cloud Storage All The Protection You Need?

My colleagues and I hear it around the office all the time – “Oh, we don’t need your product – we use Dropbox” (or iCloud, or Box, or Google Drive, or – insert your favorite cloud storage solution...

View Article

Companies should prepare for the EU’s forthcoming Data Protection Regulation

 New European legislation aims to strengthen the protection of personal data. An increase in cyber security attacks across commercial enterprises and service providers, and a consumer market wary of...

View Article

Image may be NSFW.
Clik here to view.

UK’s security and intelligence services spies got fired for accessing...

Thank you N4GM By Sully Sheperd on March 12, 2015  According to a report from Parliament’s Intelligence and Security Committee UK’s security and intelligence services – Mi5, Mi6 and GCHQ – have fired...

View Article
Browsing all 45 articles
Browse latest View live




Latest Images