All Data Loss Prevention related articles
The 2017 Cybersecurity Excellence Awards honor companies and individuals that demonstrate excellence, innovation, and leadership in information security. Winners are being chosen based on the strength of the nomination and the popular vote by the Information Security Community.
“Congratulations to CoSoSys for winning the Data Leakage Prevention category of the 2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence, and innovation in today’s cybersecurity industry.”
For us, it’s the 2nd year to participate in the DLP Solution of the Year category. We are proud that this year, and in 2016 as well, Endpoint Protector 4 …Read more
From a niche player, Apple succeeded to have a general-purpose enterprise use nowadays. Once best suited only for creative roles in design, photography or marketing, today Macs experience a growing adoption in enterprises as a result of a higher demand from all employees. One of the top reasons is the low total cost of ownership; an enterprise could save from $265 to $535 over a four-year period for each employee who uses a Mac over a PC. Apple knows that and their strategy reflects in every release and every product they launch.
Take the macOS Sierra, for example. Currently, its adoption has reached 38% among Mac users, while Windows 10 has less than 25%. When we look at the features that were released in September, we see two things – Apple’s desire to strengthen their market share by unifying users’ experience with all Apple products and their convenience and ease of …Read more
Here we are, at the end of another great year for the cybersecurity world. Along the year, we’ve witnessed some unpredictable events, but also the evolution of data loss prevention.
No one can argue that Data Loss Prevention (DLP) as a concept and technology has come a long way since it emerged in 2006. Back then it disrupted the security industry with the capabilities of identifying and blocking sensitive data from leaving the company, which no other solution could have done. It was a great innovation also due to USB control features that stopped employees from copying sensitive data to USB devices, strengthening companies’ data security. Since 2006, the DLP adoption increased exponentially and now, there is no IT security professional that hasn’t heard about this great IT security tool.
But let’s get back to the year 2016. It is a perfect moment of the year to look back and see …Read more
Every industry has its own particularities when it comes to data security risks, depending on the type of information being stored and processed, as well as on how many people have access to this information and the technologies that use it. For healthcare, patient medical records are what make the headlines when an organization is breached, and for financial organizations, bank accounts details are chased by attackers. For law firms, the trade secrets, patents, copyright details and attorney-client privileged communications are the most vulnerable. None of these industries is immune to external attacks or to insider threats. Moreover, data breaches usually occur where they are least expected because attackers have more sophisticated methods, often getting to the primary target by obtaining a set of data from other companies.
Privacy and confidentiality are essential values…Read more
There is still time until 2018, but have you sketched a game plan yet? The General Data Protection (GDPR) regulation makes a big statement about individuals’ private data and their right to request data controllers and processors to delete, correct, and forward their data. In consequence, GDPR comes with significant changes compared to the Data Protection Directive 95/46/EC involving operational changes in organizations. So, if you haven’t started to prepare for the new regulation, you better start today.
Let’s see how the game plan would look like in order to maximize your chances of getting to the finish line without spending too many resources.1. Make sure key people are aware of the changes
Chief Security Officers, IT Managers, CEOs, business unit managers, etc. have to be informed on the legal changes the GDPR imposes and should make sure they translate them into plain,…Read more
The first edition of the Cybersecurity Excellence Awards had quite an impact, creating a lot of buzz among vendors and the Information Security Community on LinkedIn. The competition was tight, with over 430 entries and many vendors competing in the same category. Winners were chosen based on votes but also comments made by voters on the nomination page. Votes were cast by the 300,000-member Information Security Community on LinkedIn, which recognizes the world’s best cybersecurity products, organizations and individuals and, by industry leaders, partners, customers and other stakeholders.
We are thrilled that Endpoint Protector 4 was voted for best Data Leakage Prevention (DLP) product of 2016. This adds up to a nice collection of awards that we won over the years, giving us a great sense of satisfaction and motivation to constantly meet our objectives and bring innovation…Read more
I didn’t learn about data security in middle school or high school. Chances are, neither did you and, probably most of your kids either. The majority of schools do not have special programs or curriculum to emphasize the importance of data security or even a solid implementation for their networks to prevent data breaches. But data security and privacy should be a mandatory subject in all schools and universities and, along the pupils or students, professors, and other staff should also be trained, just like in any organization.
Think also about the fact that today’s millennials are entering the labor market, ending up handling companies’ critical data. Future generations will probably be even more connected to technology and the Internet, so it’s not too late to start information security classes in schools and other education facilities. If kids and students don’t have…Read more
As the business environment and challenges are always changing, new cloud applications are constantly being deployed throughout the organization. Speed and flexibility are the main reason for employees to use them without being sanctioned by IT departments, which find themselves in a constant battle to keep confidential file transfers under control and stop sensitive data from getting into the wrong hands.
Slack is a messaging app used for collaboration in companies, but it has also become popular among freelancers and other independent professionals who need to communicate with different collaborators. In fact, it’s revolutionizing the way teams work by bringing messages from people together with notifications from the tools they may use at work, creating a unified archive of information accessible through powerful search. The adoption rate is great, with 3 million…Read more
Infosecurity is Europe’s largest conference on information security, featuring over 315 exhibitors and presenting the most diverse range of products and services. There will around 12,006 unique visitors from every segment of the industry. This year’s edition, like the previous one, will be held at Olympia, London from 7th to 9th June 2016. You can check the venue program and location here.
We will attend as an exhibitor for the 3rd time to showcase our main product: Endpoint Protector 4, cross-platform award-winning DLP solution.
“We are glad to participate for the 3rd time as exhibitors at the Europe’s biggest Infosecurity conference and exhibition. During the entire event, our team will greet visitors at our booth with insights into DLP technology and 1:1 demos. We invite you to join us for 3 days of great interactions,” says Roman Foeckl, founder and CEO of CoSoSys.…Read more
The quality of the services and safety are extremely important in the hospitality industry. Hotels do not only have to ensure their guests feel welcomed and comfortable but also safe and safety goes further than safe deposit boxes for valuable assets or money that most hotels provide in each room. Hotels are obliged to protect their customers’ data against data leakage, theft or loss and to secure it against cyber attacks. People usually are not aware of this, but hotels hold a lot of private records, like credit card numbers, e-mail addresses, company data, for business travelers, ID numbers, and other sensitive data. I was never curious how hotels protect or what they do with my personal details, but that’s something that each of us should investigate. You wouldn’t want your vacation to turn into a disaster because the hotel where you are staying suffered a breach and you have to …Read more