Resources

FAQs
October 28, 2020
/
Blog

Cybersecurity isn't Going to Work Until it is Simple

IBM recently reported in its fifth annual Cyber Resilient Organization Report 2020 that the average enterprise deploys 45 cybersecurity tools. Additionally, enterprises using over 50 tools ranked themselves 8% lower in their ability to detect threats and 7% lower in their defensive capabilities. Having more tools is no

Read More >
October 20, 2020
/
Blog

Cybersecurity Breakthrough Award

In the 4th annual Cybersecurity Breakthrough Awards 2020, SecureCircle was recognized as the top Enterprise Encryption Solution of the Year.

Read More >
October 19, 2020
/
Blog

National Cybersecurity Awareness Month

Now that work, school, and many other life aspects have shifted online this year, it is vitally important that we remember to take on cybersecurity precautions. Working from home introduces many new challenges for companies because their data is now in multiple different locations on different devices. Since October fo

Read More >
October 15, 2020
/
Blog

Jeff Capone of SecureCircle: 5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity

As part of Authority Magazine's series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, the CEO of SecureCircle, Jeff Capone, is interviewed by Jason Remillard. Capone shares his own experiences and tips that many organizations can use to enhance their own data pr

Read More >
October 15, 2020
/
Blog

The Real Enterprise Data Protection Problem: CAD files and Other Legacy Apps Data

CISOs who have already invested in DLP but still have a laundry list of unprotected data use cases need not worry. This is the sad norm. DASB is a specialized solution that can immediately solve a specialized data protection use case such as CAD manufacturing designs, media files, images, and legacy data formats.

Read More >
October 24, 2020
/
Blog

Need Zero Trust for a Remote Workforce? There's a Missing Link.

In today's work-from-anywhere world, there is a missing link. Controlling data once it is exported out of your perimeter and out of your SaaS apps. This is a rampant source of data leaks because no technology exists that can solve the problem at scale - until now. Welcome to DASB.

Read More >
October 5, 2020
/
Case Study

Zero Trust: SecureCircle plus Endpoint Detection and Response

ISCS obtains confidential information from their customers as part of the normal operations. The data could include business plans, detailed cost information, and intellectual property such as source code. ISCS wants to deploy a Zero Trust data security solution to demonstrate to customers’ their data is safe.

Read More >
September 28, 2020
/
Blog

Millions of Data Leaked Due to Unsecured Databases

Unsecured databases are quickly becoming a massive data security problem. Researchers have found close to 10.5 billion pieces of consumer data left vulnerable on almost 10,000 unsecured databases across 20 countries.

Read More >
September 28, 2020
/
News

Enterprise Security Weekly | Zero Trust Data Security

Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. In this webcast, Paul Asadoorian of Security Weekly and SecureCircle walk through how SecureCircle implements a zero-trust solution. A zero-trust solution requires the owner of the data to always be in control

Read More >
September 28, 2020
/
Blog

Traditional Data Security Fails to Be Zero Trust

Data security tools are not providing enough value for their customers. The average total cost of a data breach in the United States is nearly $9million per the 2020 IBM Cost of Data Breach Report. That is a five % increase from 2019. 31% of data breaches in North America can be attributed to internal actors.

Read More >
September 21, 2020
/
News

Why Traditional Data Security Can't Be Zero Trust

The challenge in securing data has increased in complexity as businesses move aggressively to cloud and modernize IT through the use of SaaS applications. In this virtual training, Paul Asadoorian and SecureCircle will walk through how both legacy approaches struggle to plug the real world security holes.

Read More >
September 3, 2020
/
Blog

Intel Internal Data Leaked By Server Hacker or Third-Party?

Yet again, another case of leaked data has hit the web. Intel, the largest chipmaker in the United States is investigating a data breach that leaked 20 GB of internal data. The assortment of documents included some marked as confidential, under NDA, and unrestricted secret. Till Kottman, a swift software engineer share

Read More >
September 3, 2020
/
Blog

Cybersecurity Risks That Come With Remote Learning

For many students, back to school session is right around the corner. Under the new circumstances of remote learning, students need to become aware of the importance of data security. School districts in the United States already have many cybersecurity shortcomings. Many lack the funding and skilled personnel to provi

Read More >
August 20, 2020
/
Blog

Why Legacy DLP Does Not Work

In today's world, it is ubiquitous for employees to abandon ship to board another one. It is also common for these employees to take confidential data with them when leaving. Data loss can become very damaging for the company, especially when the employee leaves for a competitor. Three former employers of McAfee left a

Read More >
August 20, 2020
/
Blog

Protecting Data From The Threat of Ransomware

When engaging with customers, we focus heavily on finding ways to help them on their journey to implementing a Zero Trust security strategy. We often hear concerns about ransomware protection. Our customers tell us that they see value in how we deliver security that persists with data regardless but ask how this helps

Read More >
August 19, 2020
/
News

Data Security Startup to Watch

Forrester Research has named SecureCircle a 'Data Security Startup to Watch' in the August 2020 report - The Zero Trust eXtended Ecosystem: Data, Secure Data Independently and in each Pillar of the Zero Trust Framework

Read More >
August 18, 2020
/
Blog

Cost of Data Breaches

With all of the unexpected changes occurring in 2020, some things remain the same. For its 15th year, the Ponemon Institute has conducted research to produce the annual Cost of Data Breach report published by IBM Security. This report provides a detailed view of the financial impacts, and risks security incidents can h

Read More >
August 11, 2020
/
Blog

Garmin Suffers from a Multi-Million Dollar Ransomware Attack

Once again, a massive ransomware attack causes a global outage. Garmin, a sport and fitness tech giant reportedly paid millions of dollars in ransom after shutting down from the attack. The attack put Garmin’s wearables, apps, websites, and call centers offline for several days. The payment was presumed to be around $1

Read More >
August 10, 2020
/
Blog

Hackers Use Diebold Nixdorf Source Code to Attack Their ATMs

Once again, hackers have hit the jackpot. Diebold Nixdorf, a multi-billion dollar self-service point of sale and automated teller machine (ATM) manufacturer announced that cybercriminals had found a new way to dispense cash from their machines illegally. The new software tool forced machines to dispense cash in a seri

Read More >
August 6, 2020
/
Blog

Making an ROI Case for SecureCircle

Many of our customers have budgeted projects to improve or replace existing data protection solutions, so the ROI (return on investment) case has been made upfront.

Read More >
August 4, 2020
/
Blog

Hackers Targeting Small Enterprises

For an average hacker, small enterprises can be the perfect target. Many small enterprises tend to have less sophistication in their company's cybersecurity or assume that they are too small even to attract hackers.

Read More >
August 19, 2020
/
News

Security Weekly Virtual Hacker Summer Camp Interview

For a true Zero-Trust environment, it isn’t enough to think about data in cloud services and SaaS applications, we also must protect, control, and audit data that egresses form these services onto endpoints. SecureCircle protects data that egresses from cloud services and allows you to have control over it.

Read More >
September 16, 2020
/
News

The Missing Link For Zero Trust

The future holds endless possibilities. The next great moment, widget or experience is just around the corner. In cybersecurity, we have heard promises for a better future for decades.

Read More >
September 16, 2020
/
Blog

Cybersecurity Strategies (Infographic)

The 2020 IBM Security Cyber Resilient Organization Report surveys more than 3,400 IT and security professionals from all over the world to determine their ability to detect, prevent, contain, and respond to cybersecurity incidents.

Read More >
July 27, 2020
/
Blog

Data Security is Not Data Privacy

Often the terms data security and data privacy are misused or interpreted as the same thing. Since data security and data privacy are both essential components of data protection, it is vital to know the difference between the two. Think about it this way. You protect your house with a door. If the door is glass, does

Read More >
July 27, 2020
/
Blog

Targets on Large Enterprises

Large enterprises have always been targets for hackers. Most hackers are mainly attracted to the massive amounts of capital and the customer base of large enterprises. According to the 2020 Verizon Data Breach Investigations Report, almost two-thirds of data breaches involved larger enterprises. 

Read More >
August 10, 2020
/
Blog

Secured Files on Adobe Creative Cloud

Millions of designers rely on Adobe Creative Cloud to share and collaborate with others on their work. Without proper protection, many designers risk their work being leaked to the public. This would allow anyone to view and claim the designs as their own.

Read More >
August 8, 2020
/
Blog

Brazil’s Version of GDPR is LGPD

Brazil initially passed LGPD (Lei Geral de Proteção de Dados) in 2018 to go into effect in February 2020. The implementation date pushed to August 16, 2020, which is about a month away. Is your company ready?

Read More >
July 15, 2020
/
Blog

Source Code - Holy Grail of Data Protection

CISOs and CTOs have almost given up on the idea that protecting the company crown jewels - source code - is possible. Legacy data protection solutions encumbered developers to the point developers refused to work.

Read More >
July 9, 2020
/
Blog

VPN False Sense of Security

VPNs (Virtual Private Networks) made headlines last week after the National Security Agency (NSA) warned corporations could be vulnerable to cyber-attacks if not correctly secured. The warning comes as organizations adapt to office closures, and employees continue to work from home.

Read More >
August 27, 2020
/
Blog

Remote Workforce? Protect Your Data Wherever It Leaks

Companies need to enable their teams to work remotely across the world, including work from home. Remote distributed workforces have grown 44% over the last five years.

Read More >
July 6, 2020
/
Blog

Healthcare Internal Threat Solution

The rate of internal threats is on the rise, leaving many organizations at risk. In some industries, they occur way more frequently whether it's accidental or malicious. The healthcare industry is one of the most commonly threatened.

Read More >
August 19, 2020
/
Featured

The Ransomware Protection Solution

Ransomware continues to be a daily headline in the news. To prevent ransomware from infecting an organization, deploy SecureCircle and an Endpoint Detection and Response (EDR) solution. SecureCircle and EDR provide a productive ransomware protection solution.

Read More >
June 19, 2020
/
Blog

NYPD Privacy Breach

The New York City council demands an investigation to determine how the mayor's daughter's arrest record was released on Twitter. They believe there are two guilty parties; those who committed the privacy breach from NYPD and those who knew about it and did not notify any city officials.

Read More >
June 19, 2020
/
Blog

Popular App Mathway Leaks Users Records

Mathway, a popular app to assist students with math, suffered a massive data breach. More than 25 million user records have potentially been sold on the dark web by hackers known as the ShinyHunters.

Read More >
June 19, 2020
/
Blog

What is Data Loss Prevention?

SecureCircle's unique features and overall approach to data loss prevention allow organizations to protect data without impacting end-users or changing business workflow. Organizations can support a wide range of use cases such as accidental and malicious insiders, and more.

Read More >
June 19, 2020
/
Case Study

Distributed-Workforce | Case Study

SecureCircle enables DMF to secure data with a distributed workforce without requiring employees to change their workflow. DMF maintains complete protection and control over their sensitive customer IP.

Read More >
June 19, 2020
/
Blog

Follow the Data Breach and DLP Money

CISOs and IT departments have growing demands and limited budgets. Free up money and resources by selecting the proper DLP solution.

Read More >
June 19, 2020
/
Blog

Law Firm Leaks Celebrity Data

The New York law firm of Grubman Shire Meiselas and Sacks that serves some of the many well-known celebrities such as Lady Gaga, Madonna, Mariah Carey, and U2 appears to have fallen into a REvil ransomware attack. 

Read More >
June 19, 2020
/
News

Audits Don't Solve Security Problems

Forbes.com: GDPR is a first compliance regulation that doesn't rely on audits and fines organizations for noncompliance resulting in data breaches. Explore the requirements of GDPR as well as learn how SecureCircle reduces your GDPR risk.

Read More >
June 19, 2020
/
Blog

Securing Source Code & Intellectual Property While Working From Home

One of the largest Original Design Manufacturer (“ODM”) companies in the world with design and manufacturing sites worldwide.

Read More >
June 19, 2020
/
Blog

DASB Vs. DLP: Operational Overhead

By deploying an opt-out, protect by default solution, organizations can reduce the amount of time spent on maintaining DLP solutions and reduce data breaches caused by incomplete, insufficient, outdated, or conflicting policy rules. SecureCircle's DASB prevents data breaches and insider threats.

Read More >
June 19, 2020
/
Blog

Avoid The High Cost Of Data Loss Prevention (DLP)

SecureCircle measures successful implementation in days and weeks. Our customers have complained that DLP and Information Rights Management (IRM) solutions have taken quarters to years to implement, if at all.

Read More >
June 19, 2020
/
Blog

Modern Encryption from the Beginning : The Split-Key

Today we can experience a whole new world of encryption due to a man who led the way in cryptography. Thanks to Whitfield Diffie and his invention of public-key cryptography, we started down a path to provide privacy over digital communications and commerce.

Read More >
June 19, 2020
/
Blog

What Do Zoom, Dog Walkers, And Encryption Have In Common?

The secure solution to grant access to the house without giving up control requires a broker to decide when the door should be unlocked. With today’s modern physical security tools, biometrics grants access.

Read More >
June 19, 2020
/
Blog

DASB Replaces DLP

FSC has been mandated to protect sensitive financial and personal information for mandatory compliance requirements. In particular, FSC wants to protect and track sensitive data as soon as it is accessed from their SQL databases and transformed into flat files stored on their file servers.

Read More >
June 19, 2020
/
Blog

Why Isn’t DLP Preventing Data Breaches?

Data loss prevention (DLP), the antiquated data protection model, takes a ‘manage by rule’ approach where all data flows freely unless the security team has written a rule to specifically protect the data.

Read More >
May 1, 2020
/
Blog

Cyber Hygiene

Read More >
June 19, 2020
/
Blog

Security Risks From Employees Working From Home

More employees are working from home and causing additional security challenges. In a recent Wall Street Journal article citing information concerning Apple.

Read More >
June 19, 2020
/
News

Is 'Discover, Classify, Protect' Wrong In Cybersecurity Today?

Forbes.com: Data protection has followed the same paradigm for years: discover, classify and protect. That paradigm exists because years ago, protection solutions were extremely painful to implement. Administrative overhead was high. The end-user impact was high.

Read More >
June 19, 2020
/
News

Breadth Vs. Depth: Cybersecurity Industry Has Been Focusing On The Wrong Thing

Forbes.com: The cybersecurity industry's approach to data protection has only ever resolved the depth of security problems. There are data loss prevention (DLP), information rights management (IRM), encryption and many solutions available that can only protect a few pieces of data well.

Read More >
June 19, 2020
/
Blog

Third Party Vendors

Health Share of Oregon, the state's largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth, Social Security numbers, and Medicaid ID numbers.

Read More >
June 19, 2020
/
Blog

The Rise Of DASB, Sunset Your DLP

5 reasons why organizations are switching

Read More >
June 19, 2020
/
Blog

AWS Source Code Leak

Source code breaches are occurring daily with damaging consequences. Uber and Google made headlines when a former Google engineer easily exfiltrated 9 GB of source code and hundreds of Waymo trade secrets. Tesla source code was breached by an employee, exfiltrating over 300,000 files for personal gain. Apple and Samsun

Read More >
August 19, 2020
/
Blog

End Source Code Theft

CSC needed to ensure that their source code was not stolen or lost. A costly virtual desktop infrastructure (VDI) solution, was implemented to prevent misuse and add accountability for developers working with source code.

Read More >
September 16, 2020
/
Press Releases

SecureCircle Data Access Security Broker (DASB) Selected By Quanta Storage To Eliminate Insider Threats

SecureCircle, the world's first Data Access Security Broker (DASB),today announced an agreement to eliminate insider threats such as accidental sharing and malicious users to Quanta Storage Inc. (QSI). QSI, a worldwide leader in OEM and ODM services to the world's leading consumer electronics brands is based in Taiwan.

Read More >
June 17, 2020
/
Case Study

Organizations Should Bulk Up Cybersecurity In Case Of Iranian Cyber Attack

Immediately after the United States assassinated Iranian Maj.

Read More >
May 22, 2020
/
News

The Evolution of Data Protection

Forbes.com: Data protection solutions are finally evolving to the current state of data: distributed, cloud-centric and always-on. Data used to only exist within the corporate network on devices that never left the physical protection of the company.

Read More >
June 19, 2020
/
Blog

Ransomware stealing data before encrypting

The second flavor of ransomware should only be an annoyance to organizations as a proper backup system should be able to restore to a point in time prior to the ransomware infection.

Read More >
March 31, 2020
/
Blog

Insider Threats Infographic

Read More >
June 19, 2020
/
Blog

Who collected 4 billion records on 1.2 billion users?

Over a week ago, security researchers Vinny Troia and Bob Diachenko uncovered four billion records on 1.2 billion people on an unsecured Elastisearch server.

Read More >
June 19, 2020
/
Blog

Macy’s Unhappy Thanksgiving – Unauthorized Application Causes Data Breach

With SecureCircle’s DASB, organizations can eliminate unauthorized application threats.

Read More >
June 19, 2020
/
Blog

Cisco Systems - Target of Malicious Insiders

Cisco Systems sued former senior employees for stealing thousands of files containing confidential information.

Read More >
June 19, 2020
/
News

CSO | Take a new approach to data security: protect all of it

Don’t just pick and choose data and documents to protect: secure unstructured data, too.

Read More >
June 19, 2020
/
News

EContent | How to Protect Your WordPress Site from Keylogger Malware

It’s probably not surprising that WordPress powers 30% of the internet. But you may be surprised to learn that, at the time of this writing, over 2,300 websites run on WordPress were infected by malware.

Read More >
June 19, 2020
/
News

The Entrepreneur Way: Not Not Failing Is Not an Option with Jeff Capone

SecureCircle, which he co-founded in 2015. An award-winning executive leader with expertise in enterprise software development, network and storage solutions, and IoT applications.

Read More >
March 31, 2020
/
News

2018 Secure Campus Awards

Read More >
March 31, 2020
/
News

2018 Govies Awards

Read More >
June 19, 2020
/
News

SDxCentral | Four Security Myths You Need to Shake

There is no place – internally or externally – or type of data that is safe. If we embrace that truth, then we won’t be lulled into a false sense of security.

Read More >
March 31, 2020
/
News

MegaMinds AIthority Interview with Jeff Capone

Read More >
March 31, 2020
/
News

Security Today | Digital Security in a Zero Trust World

Read More >
March 31, 2020
/
News

CSO | The Impact of Human Behavior on Security

Read More >
March 31, 2020
/
News

GDPR Compliance Tips: The Top Experts Speak

Read More >
March 31, 2020
/
News

SecureCircle will be exhibiting at CIAB Sao Paulo Brazil June 2018

Read More >
March 31, 2020
/
News

CSO | GDPR: Where are we now?

Read More >
March 31, 2020
/
News

Strategic Finance | Security in a World of Zero Trust

Read More >
March 31, 2020
/
News

Security Info Watch | Enterprises Beware: Cybersecurity Challenges in the Cloud

Read More >
March 31, 2020
/
News

CSO | The hidden security problem we all need to know about

Read More >
March 31, 2020
/
News

CTimes | SecureCircle and Netbridge Distribution Partnership (Chinese)

Read More >
May 21, 2020
/
News

Security Today | Rethinking Access Control

Read More >
March 31, 2020
/
News

Security InfoWatch | The Last Mile Security at the Edge

Read More >
March 31, 2020
/
News

Forbes | 10 Industries On The Cusp Of Technological Disruption

Read More >
May 22, 2020
/
News

Four Keys to Data-Centric Data Protection

Forbes.com: Data protection solutions such a firewall, network data loss prevention (DLP), endpoint DLP, information rights management IRM, classification, file encryption and others have tried to solve the growing data protection needs of organizations of all sizes. Legacy data protection solutions are not doing enough to protect organizations from data breaches. The answer to every organization’s problem has been sitting right in front of it the entire time: the data itself. Organizations need to move to new data-centric data loss prevention solutions on the market.

Read More >
March 31, 2020
/
News

Disruptor Daily | What is the future of cybersecurity? Experts share their insights

Read More >
March 31, 2020
/
News

Disruptor Daily | What trends are shaping cybersecurity in 2019?

Read More >
May 22, 2020
/
News

End Insider Threats Without Impacting Users Or Business Workflow

Forbes.com: Today, insider threats can be eliminated by adopting data-centric data protection. Legacy data protection solutions focused on networks, endpoints, files and disks. Those solutions did not protect information as it moved from one device or medium to another.

Read More >
March 31, 2020
/
News

CIO IT Taiwan | SecureCircle 控管檔案讀取 權不怕合作生變造成洩密

Read More >
May 21, 2020
/
Press Releases

SecureCircle Launches to Bring Ubiquitous, Transparent Security to Unstructured Data

Read More >
March 31, 2020
/
Press Releases

SecureCircle Adds Security Industry Veteran Ted Plumis to Advisory Board

Read More >
March 31, 2020
/
Press Releases

Ahead of RSA Conference, SecureCircle Announces Three New Channel Partners

Read More >
March 31, 2020
/
Press Releases

SecureCircle Receives Platinum And Gold Awards for Cybersecurity And Encryption

Read More >
March 31, 2020
/
Press Releases

SecureCircle and Fiandeira Tecnologia Showcase Unstructured Data Solution at CIAB FEBRABAN

Read More >
March 31, 2020
/
Press Releases

SecureCircle Announces Asia Pacific Distributor, NetBridge Technologies

Read More >
March 31, 2020
/
Press Releases

SecureCircle Introduces Enhanced Cybersecurity Offering for Cloud-First Enterprises

Read More >
March 31, 2020
/
Press Releases

SecureCircle Introduces Send Secure for Agentless Protected Data Sharing

Read More >
March 31, 2020
/
Press Releases

SecureCircle announces United Kingdom and EMEA Distributor, Care21

Read More >
March 31, 2020
/
Press Releases

SecureCircle placed on UK Government Framework Catalogue

Read More >
March 31, 2020
/
Press Releases

SecureCircle available on Taiwan Government CloudMarketplace

Read More >
May 21, 2020
/
Blog

Account compromised? What about your file content?

Read More >
March 31, 2020
/
Blog

Not via Sonic the Hedgehog

Read More >