The State of Security: It’s Broken
It’s time to move past the hyperbole of next-gen security and look to new approaches that show enterprises how to understand and assess their unique risks. Will 2014 be the year of change for the...
View ArticleFederal Judge Rules NSA Metadata Collection is Unconstitutional
In a court ruling, Judge Richard Leon described the agency’s tactics as “almost Orwellian”. A U.S. District Court Judge in Washington ruled that the National Security Agency’s (NSA) bulk collection of...
View ArticleTarget Credit Card Breach Affects 40 Million Accounts
December 19, 2013 (MINNEAPOLIS) — Target is grappling with a data security nightmare that threatens to drive off holiday shoppers during the company’s busiest time of year. The nation’s second largest...
View ArticleWhat’s The Greatest Security Risk?
While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a study by the Ponemon...
View ArticleSocial Engineering, Hacking The Human OS
Social engineering, sometimes called the science and art of human hacking, has become quite popular in recent years given the exponential growth of social networks, email and other forms of electronic...
View ArticleTrend Micro: One Major Data Breach a Month in 2014?
If you thought this was a bad year in terms of data breaches, wait till 2014 when a major data breach is likely to occur each month. This was one of eight grim predictions for 2014 by security vendor...
View ArticleThe World’s Most Integration-Friendly IRM System – Now Enhanced For External...
Seclore announced the availability of V 2.46 of its flagship Information Rights Management (IRM) technology – Seclore FileSecure. Building on the core philosophy of being integration-friendly, the new...
View ArticleIRM Benefits HR OutSourcing
Outsourcing has become quite common in IT in the recent years, as it enables the company to focus more on their core business. In addition to this, outsourcing provides a better and a cheaper means of...
View ArticleLaunch of Seclore FileSecure IRM by Red Herring Asia Top 100 company
The Red Herring Asia Top 100 company and financial system integrator, has launched Seclore’s FileSecure information rights management solution in the region. Information rights management is an...
View ArticleBank Cannot Violate a Customer’s Privacy – State Government Order
MUMBAI: The state government has passed strictures against a public sector bank for parting with confidential customer data. “BoB has done absolutely no investigation on its own to find how this...
View ArticleIT security overhaul at National Research Council to cost $32.5M
Fortifying the National Research Council’s computer systems in the wake of a high-profile cyber attack last year will cost the federal government $32.5 million. That money, given to the government’s...
View ArticleData Breach At Uber
Statement Uber Statement February 27, 2015 Posted by Katherine Tassi In late 2014, we identified a one-time access of an Uber database by an unauthorized third party. A small percentage of current and...
View ArticleUK ranks first in Europe for data breaches
Last year saw more than one billion records compromised thanks to numerous data breaches, claims a recent report, which also found that the UK is at the top of the list when it comes to breaches....
View ArticleTechnology First
A free magazine and an educational interesting view and read. More at….. / . IRM Secure is a provider of Information Rights Management solutions. We assist our clients by providing the ability to...
View ArticleAre digital loss prevention and signature-based anti-virus living on borrowed...
Fingerprint-based Data Loss Prevention (DLP) and Signature-based Antivirus (AV) have long been security industry mainstays, but with the speed of the business environment outpacing the technology they...
View ArticleThe top four places your data is at risk
We all worry about protecting our information, but how do we know which activities or locations are most likely to put it in jeopardy? Digital rights management company Seclore has produced an...
View ArticleThe hidded benefits of data protection: INVESTMENT
We’ve all seen the headlines: “Laptop stolen – thousands of customer records lost” “Malware on Lime Crime website, payment cards compromised” “California Dentist announces theft of server containing...
View ArticleIs Cloud Storage All The Protection You Need?
My colleagues and I hear it around the office all the time – “Oh, we don’t need your product – we use Dropbox” (or iCloud, or Box, or Google Drive, or – insert your favorite cloud storage solution...
View ArticleCompanies should prepare for the EU’s forthcoming Data Protection Regulation
New European legislation aims to strengthen the protection of personal data. An increase in cyber security attacks across commercial enterprises and service providers, and a consumer market wary of...
View ArticleUK’s security and intelligence services spies got fired for accessing...
Thank you N4GM By Sully Sheperd on March 12, 2015 According to a report from Parliament’s Intelligence and Security Committee UK’s security and intelligence services – Mi5, Mi6 and GCHQ – have fired...
View Article
More Pages to Explore .....