Regular attendees are expecting to join the main Cybersecurity Conferences to be held this year even though they will mostly be in a virtual mode. SecureCircle lists here the top 10 conferences that you cannot miss.
Read More >As the calendar turns to a new year and we gladly put 2020 behind us, here are a few predictions for the new year.
Read More >For a true Zero-Trust environment, it isn’t enough to think about data in cloud services and SaaS applications. We also must protect, control and audit data that egresses from these services onto endpoints.
Read More >2020 has by far been one of the most challenging years for many of us. With everything that has been occurring in our world, it most certainly has brought us a collective amount of uncertainty. Overall, this year has been a wild ride and will most definitely go down in history.
Read More >Some enterprises I've worked with that have deployed a zero trust (trust no one) model have still experienced data breaches. With zero trust implemented correctly, data breaches can be eliminated or minimized to small datasets.
Read More >The road to a granted software patent continues to be a long, frustrating, and expensive process. In just a few years, old software can be replaced even before a patent application is complete. Typically, patent applications take about four years to complete, which is very time consuming for most companies.
Read More >SecureCircle helps eliminate data breaches from malicious external attacks such as Palmerworm and malicious and accidental insiders.
Read More >Security Weekly hosts and SecureCircle's CEO, Jeff Capone, discuss Zero Trust Data Security. SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. Ensure all your data is secure, without impacting the business.
Read More >App, User, and Data, but it's all about the data! Discovering and classifying data to protect it is tough. What if you can protect all of your data? Jeff Capone, CEO and Co-founder at SecureCircle, joins Security Weekly to discuss how to protect all of your data and stop asking "Where's your data?". If we can protect
Read More >Security Weekly hosts and SecureCircle dive into Zero Trust DLP. Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. A zero-trust solution requires the owner of the data to always be in control at all times.
Read More >QSI obtains customer intellectual property (IP) such as designs, roadmaps, costs, legal documents, and schedules. Customers are concerned about the safety of their IP. The IP includes traditional Office files, source code, mechanical design files, photos, videos, and more.
Read More >When deployed in a best practice configuration, SecureCircle can secure source code on endpoints without development teams needing to change how they operate or interact with code, IDEs, and development tools. This whitepaper focuses on SecureCircle best practices for securing source code in development environments.
Read More >Security Weekly hosts and the CEO of SecureCircle, Jeff Capone, dive into how we can have conditional data access for endpoints. "Most folks think about using Conditional access for SaaS applications or access to specific data sources. However, once that data is accessed how do you continuously enforce conditional acce
Read More >IBM recently reported in its fifth annual Cyber Resilient Organization Report 2020 that the average enterprise deploys 45 cybersecurity tools. Additionally, enterprises using over 50 tools ranked themselves 8% lower in their ability to detect threats and 7% lower in their defensive capabilities. Having more tools is no
Read More >In the 4th annual Cybersecurity Breakthrough Awards 2020, SecureCircle was recognized as the top Enterprise Encryption Solution of the Year.
Read More >Now that work, school, and many other life aspects have shifted online this year, it is vitally important that we remember to take on cybersecurity precautions. Working from home introduces many new challenges for companies because their data is now in multiple different locations on different devices. Since October fo
Read More >As part of Authority Magazine's series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, the CEO of SecureCircle, Jeff Capone, is interviewed by Jason Remillard. Capone shares his own experiences and tips that many organizations can use to enhance their own data pr
Read More >CISOs who have already invested in DLP but still have a laundry list of unprotected data use cases need not worry. This is the sad norm. DASB is a specialized solution that can immediately solve a specialized data protection use case such as CAD manufacturing designs, media files, images, and legacy data formats.
Read More >In today's work-from-anywhere world, there is a missing link. Controlling data once it is exported out of your perimeter and out of your SaaS apps. This is a rampant source of data leaks because no technology exists that can solve the problem at scale - until now. Welcome to DASB.
Read More >The combination of SecureCircle with an advanced Endpoint Detection and Remediation solution provides the capability to affordably implement a Zero Trust security architecture that completely captures and controls all user’s interactions with our information no matter what.
Read More >Unsecured databases are quickly becoming a massive data security problem. Researchers have found close to 10.5 billion pieces of consumer data left vulnerable on almost 10,000 unsecured databases across 20 countries.
Read More >Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. In this webcast, Paul Asadoorian of Security Weekly and SecureCircle walk through how SecureCircle implements a zero-trust solution. A zero-trust solution requires the owner of the data to always be in control
Read More >Data security tools are not providing enough value for their customers. The average total cost of a data breach in the United States is nearly $9million per the 2020 IBM Cost of Data Breach Report. That is a five % increase from 2019. 31% of data breaches in North America can be attributed to internal actors.
Read More >The challenge in securing data has increased in complexity as businesses move aggressively to cloud and modernize IT through the use of SaaS applications. In this virtual training, Paul Asadoorian and SecureCircle will walk through how both legacy approaches struggle to plug the real world security holes.
Read More >Yet again, another case of leaked data has hit the web. Intel, the largest chipmaker in the United States is investigating a data breach that leaked 20 GB of internal data. The assortment of documents included some marked as confidential, under NDA, and unrestricted secret. Till Kottman, a swift software engineer share
Read More >For many students, back to school session is right around the corner. Under the new circumstances of remote learning, students need to become aware of the importance of data security. School districts in the United States already have many cybersecurity shortcomings. Many lack the funding and skilled personnel to provi
Read More >In today's world, it is ubiquitous for employees to abandon ship to board another one. It is also common for these employees to take confidential data with them when leaving. Data loss can become very damaging for the company, especially when the employee leaves for a competitor. Three former employers of McAfee left a
Read More >When engaging with customers, we focus heavily on finding ways to help them on their journey to implementing a Zero Trust security strategy. We often hear concerns about ransomware protection. Our customers tell us that they see value in how we deliver security that persists with data regardless but ask how this helps
Read More >Forrester Research has named SecureCircle a 'Data Security Startup to Watch' in the August 2020 report - The Zero Trust eXtended Ecosystem: Data, Secure Data Independently and in each Pillar of the Zero Trust Framework
Read More >With all of the unexpected changes occurring in 2020, some things remain the same. For its 15th year, the Ponemon Institute has conducted research to produce the annual Cost of Data Breach report published by IBM Security. This report provides a detailed view of the financial impacts, and risks security incidents can h
Read More >Once again, a massive ransomware attack causes a global outage. Garmin, a sport and fitness tech giant reportedly paid millions of dollars in ransom after shutting down from the attack. The attack put Garmin’s wearables, apps, websites, and call centers offline for several days. The payment was presumed to be around $1
Read More >Many of our customers have budgeted projects to improve or replace existing data protection solutions, so the ROI (return on investment) case has been made upfront.
Read More >For an average hacker, small enterprises can be the perfect target. Many small enterprises tend to have less sophistication in their company's cybersecurity or assume that they are too small even to attract hackers.
Read More >For a true Zero-Trust environment, it isn’t enough to think about data in cloud services and SaaS applications, we also must protect, control, and audit data that egresses form these services onto endpoints. SecureCircle protects data that egresses from cloud services and allows you to have control over it.
Read More >The future holds endless possibilities. The next great moment, widget or experience is just around the corner. In cybersecurity, we have heard promises for a better future for decades.
Read More >The 2020 IBM Security Cyber Resilient Organization Report surveys more than 3,400 IT and security professionals from all over the world to determine their ability to detect, prevent, contain, and respond to cybersecurity incidents.
Read More >Often the terms data security and data privacy are misused or interpreted as the same thing. Since data security and data privacy are both essential components of data protection, it is vital to know the difference between the two. Think about it this way. You protect your house with a door. If the door is glass, does
Read More >Large enterprises have always been targets for hackers. Most hackers are mainly attracted to the massive amounts of capital and the customer base of large enterprises. According to the 2020 Verizon Data Breach Investigations Report, almost two-thirds of data breaches involved larger enterprises.
Read More >Millions of designers rely on Adobe Creative Cloud to share and collaborate with others on their work. Without proper protection, many designers risk their work being leaked to the public. This would allow anyone to view and claim the designs as their own.
Read More >Brazil initially passed LGPD (Lei Geral de Proteção de Dados) in 2018 to go into effect in February 2020. The implementation date pushed to August 16, 2020, which is about a month away. Is your company ready?
Read More >CISOs and CTOs have almost given up on the idea that protecting the company crown jewels - source code - is possible. Legacy data protection solutions encumbered developers to the point developers refused to work.
Read More >VPNs (Virtual Private Networks) made headlines last week after the National Security Agency (NSA) warned corporations could be vulnerable to cyber-attacks if not correctly secured. The warning comes as organizations adapt to office closures, and employees continue to work from home.
Read More >Companies need to enable their teams to work remotely across the world, including work from home. Remote distributed workforces have grown 44% over the last five years.
Read More >The rate of internal threats is on the rise, leaving many organizations at risk. In some industries, they occur way more frequently whether it's accidental or malicious. The healthcare industry is one of the most commonly threatened.
Read More >Ransomware continues to be a daily headline in the news. To prevent ransomware from infecting an organization, deploy SecureCircle and an Endpoint Detection and Response (EDR) solution. SecureCircle and EDR provide a productive ransomware protection solution.
Read More >The New York City council demands an investigation to determine how the mayor's daughter's arrest record was released on Twitter. They believe there are two guilty parties; those who committed the privacy breach from NYPD and those who knew about it and did not notify any city officials.
Read More >Mathway, a popular app to assist students with math, suffered a massive data breach. More than 25 million user records have potentially been sold on the dark web by hackers known as the ShinyHunters.
Read More >SecureCircle's unique features and overall approach to data loss prevention allow organizations to protect data without impacting end-users or changing business workflow. Organizations can support a wide range of use cases such as accidental and malicious insiders, and more.
Read More >SecureCircle enables DMF to secure data with a distributed workforce without requiring employees to change their workflow. DMF maintains complete protection and control over their sensitive customer IP.
Read More >CISOs and IT departments have growing demands and limited budgets. Free up money and resources by selecting the proper DLP solution.
Read More >The New York law firm of Grubman Shire Meiselas and Sacks that serves some of the many well-known celebrities such as Lady Gaga, Madonna, Mariah Carey, and U2 appears to have fallen into a REvil ransomware attack.
Read More >Forbes.com: GDPR is a first compliance regulation that doesn't rely on audits and fines organizations for noncompliance resulting in data breaches. Explore the requirements of GDPR as well as learn how SecureCircle reduces your GDPR risk.
Read More >One of the largest Original Design Manufacturer (“ODM”) companies in the world with design and manufacturing sites worldwide.
Read More >By deploying an opt-out, protect by default solution, organizations can reduce the amount of time spent on maintaining DLP solutions and reduce data breaches caused by incomplete, insufficient, outdated, or conflicting policy rules. SecureCircle's DASB prevents data breaches and insider threats.
Read More >SecureCircle measures successful implementation in days and weeks. Our customers have complained that DLP and Information Rights Management (IRM) solutions have taken quarters to years to implement, if at all.
Read More >Today we can experience a whole new world of encryption due to a man who led the way in cryptography. Thanks to Whitfield Diffie and his invention of public-key cryptography, we started down a path to provide privacy over digital communications and commerce.
Read More >The secure solution to grant access to the house without giving up control requires a broker to decide when the door should be unlocked. With today’s modern physical security tools, biometrics grants access.
Read More >FSC has been mandated to protect sensitive financial and personal information for mandatory compliance requirements. In particular, FSC wants to protect and track sensitive data as soon as it is accessed from their SQL databases and transformed into flat files stored on their file servers.
Read More >Data loss prevention (DLP), the antiquated data protection model, takes a ‘manage by rule’ approach where all data flows freely unless the security team has written a rule to specifically protect the data.
Read More >More employees are working from home and causing additional security challenges. In a recent Wall Street Journal article citing information concerning Apple.
Read More >Forbes.com: Data protection has followed the same paradigm for years: discover, classify and protect. That paradigm exists because years ago, protection solutions were extremely painful to implement. Administrative overhead was high. The end-user impact was high.
Read More >Forbes.com: The cybersecurity industry's approach to data protection has only ever resolved the depth of security problems. There are data loss prevention (DLP), information rights management (IRM), encryption and many solutions available that can only protect a few pieces of data well.
Read More >Health Share of Oregon, the state's largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth, Social Security numbers, and Medicaid ID numbers.
Read More >Source code breaches are occurring daily with damaging consequences. Uber and Google made headlines when a former Google engineer easily exfiltrated 9 GB of source code and hundreds of Waymo trade secrets. Tesla source code was breached by an employee, exfiltrating over 300,000 files for personal gain. Apple and Samsun
Read More >CSC needed to ensure that their source code was not stolen or lost. A costly virtual desktop infrastructure (VDI) solution, was implemented to prevent misuse and add accountability for developers working with source code.
Read More >SecureCircle, the world's first Data Access Security Broker (DASB),today announced an agreement to eliminate insider threats such as accidental sharing and malicious users to Quanta Storage Inc. (QSI). QSI, a worldwide leader in OEM and ODM services to the world's leading consumer electronics brands is based in Taiwan.
Read More >Immediately after the United States assassinated Iranian Maj.
Read More >Forbes.com: Data protection solutions are finally evolving to the current state of data: distributed, cloud-centric and always-on. Data used to only exist within the corporate network on devices that never left the physical protection of the company.
Read More >The second flavor of ransomware should only be an annoyance to organizations as a proper backup system should be able to restore to a point in time prior to the ransomware infection.
Read More >Over a week ago, security researchers Vinny Troia and Bob Diachenko uncovered four billion records on 1.2 billion people on an unsecured Elastisearch server.
Read More >With SecureCircle’s DASB, organizations can eliminate unauthorized application threats.
Read More >Cisco Systems sued former senior employees for stealing thousands of files containing confidential information.
Read More >Don’t just pick and choose data and documents to protect: secure unstructured data, too.
Read More >It’s probably not surprising that WordPress powers 30% of the internet. But you may be surprised to learn that, at the time of this writing, over 2,300 websites run on WordPress were infected by malware.
Read More >SecureCircle, which he co-founded in 2015. An award-winning executive leader with expertise in enterprise software development, network and storage solutions, and IoT applications.
Read More >There is no place – internally or externally – or type of data that is safe. If we embrace that truth, then we won’t be lulled into a false sense of security.
Read More >Forbes.com: Data protection solutions such a firewall, network data loss prevention (DLP), endpoint DLP, information rights management IRM, classification, file encryption and others have tried to solve the growing data protection needs of organizations of all sizes. Legacy data protection solutions are not doing enough to protect organizations from data breaches. The answer to every organization’s problem has been sitting right in front of it the entire time: the data itself. Organizations need to move to new data-centric data loss prevention solutions on the market.
Read More >Forbes.com: Today, insider threats can be eliminated by adopting data-centric data protection. Legacy data protection solutions focused on networks, endpoints, files and disks. Those solutions did not protect information as it moved from one device or medium to another.
Read More >