Cyber Hygiene

Cyber Hygiene

by SecureCircle
 | 
March 26, 2020
February 28, 2021
 | 
Blog

Washing your hands for 20 seconds is excellent to prevent getting the cold or flu, but what are some cyber hygiene practices businesses can put in place to protect their IT systems and, more importantly, their data.

Security Risks From Employees Working From Home

Security Risks From Employees Working From Home

by SecureCircle
 | 
March 16, 2020
June 19, 2020
 | 
Blog

More employees are working from home and causing additional security challenges. In a recent Wall Street Journal article citing information concerning Apple.

The Rise Of DASB, Sunset Your DLP

The Rise Of DASB, Sunset Your DLP

by SecureCircle
 | 
February 17, 2020
June 19, 2020
 | 
Blog

5 reasons why organizations are switching

Third Party Vendors

Third Party Vendors

by SecureCircle
 | 
February 17, 2020
February 28, 2021
 | 
Blog

Health Share of Oregon, the state's largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth, Social Security numbers, and Medicaid ID numbers.

How to Prevent Source Code Modification & Leaks

How to Prevent Source Code Modification & Leaks

by SecureCircle
 | 
February 4, 2020
December 22, 2020
 | 
Blog

Source code breaches are occurring daily with damaging consequences. Uber and Google made headlines when a former Google engineer easily exfiltrated 9 GB of source code and hundreds of Waymo trade secrets. Tesla source code was breached by an employee, exfiltrating over 300,000 files for personal gain. Apple and Samsun

End Source Code Theft

End Source Code Theft

by SecureCircle
 | 
January 28, 2020
January 6, 2021
 | 
Blog

CSC needed to ensure that their source code was not stolen or lost. A costly virtual desktop infrastructure (VDI) solution, was implemented to prevent misuse and add accountability for developers working with source code.

Why Isn't DLP Preventing Data Breaches and Data Leakage?

Why Isn't DLP Preventing Data Breaches and Data Leakage?

by SecureCircle
 | 
January 17, 2020
February 28, 2021
 | 
Blog

Data loss prevention (DLP), the antiquated data protection model, takes a ‘manage by rule’ approach where all data flows freely unless the security team has written a rule to specifically protect the data.

Ransomware stealing data before encrypting

Ransomware stealing data before encrypting

by SecureCircle
 | 
December 18, 2019
June 19, 2020
 | 
Blog

The second flavor of ransomware should only be an annoyance to organizations as a proper backup system should be able to restore to a point in time prior to the ransomware infection.

Insider Threats Infographic

Insider Threats Infographic

by SecureCircle
 | 
December 6, 2019
March 31, 2020
 | 
Blog

Who collected 4 billion records on 1.2 billion users?

Who collected 4 billion records on 1.2 billion users?

by SecureCircle
 | 
December 2, 2019
June 19, 2020
 | 
Blog

Over a week ago, security researchers Vinny Troia and Bob Diachenko uncovered four billion records on 1.2 billion people on an unsecured Elastisearch server.

Macy’s Unhappy Thanksgiving – Unauthorized Application Causes Data Breach

Macy’s Unhappy Thanksgiving – Unauthorized Application Causes Data Breach

by SecureCircle
 | 
November 20, 2019
June 19, 2020
 | 
Blog

With SecureCircle’s DASB, organizations can eliminate unauthorized application threats.

Cisco Systems - Target of Malicious Insiders

Cisco Systems - Target of Malicious Insiders

by SecureCircle
 | 
November 19, 2019
June 19, 2020
 | 
Blog

Cisco Systems sued former senior employees for stealing thousands of files containing confidential information.

New Yorks SHIELD Act

New Yorks SHIELD Act

by SecureCircle
 | 
October 8, 2019
March 31, 2020
 | 
Blog

Insider Threat at Lion Air (Update)

Insider Threat at Lion Air (Update)

by SecureCircle
 | 
September 25, 2019
March 31, 2020
 | 
Blog

How to Prevent the Lion Air Databreach

How to Prevent the Lion Air Databreach

by SecureCircle
 | 
September 20, 2019
March 31, 2020
 | 
Blog

How to Prevent the Mastercard Data Breach

How to Prevent the Mastercard Data Breach

by SecureCircle
 | 
September 6, 2019
March 31, 2020
 | 
Blog

Capital One Hacker Breached 30 Companies Through a Single Cloud Provider

Capital One Hacker Breached 30 Companies Through a Single Cloud Provider

by SecureCircle
 | 
August 29, 2019
May 21, 2020
 | 
Blog

Government Organizations Are Not Ready for Cyberattacks

Government Organizations Are Not Ready for Cyberattacks

by SecureCircle
 | 
August 22, 2019
March 31, 2020
 | 
Blog

How to Prevent the Boeing Data Leak

How to Prevent the Boeing Data Leak

by SecureCircle
 | 
August 13, 2019
March 31, 2020
 | 
Blog

Singapore Overhauling Data Protection Practices

Singapore Overhauling Data Protection Practices

by SecureCircle
 | 
July 24, 2019
March 31, 2020
 | 
Blog

The New Federal Data Strategy

The New Federal Data Strategy

by SecureCircle
 | 
July 10, 2019
March 31, 2020
 | 
Blog

Quest Diagnostics and LabCorp in Trouble

Quest Diagnostics and LabCorp in Trouble

by SecureCircle
 | 
July 6, 2019
March 31, 2020
 | 
Blog

Insider Threat in the Air Force

Insider Threat in the Air Force

by SecureCircle
 | 
July 3, 2019
March 31, 2020
 | 
Blog

How to Combat the Business Email Compromise Scam

How to Combat the Business Email Compromise Scam

by SecureCircle
 | 
May 31, 2019
March 31, 2020
 | 
Blog

How to Prevent Government Data Breaches

How to Prevent Government Data Breaches

by SecureCircle
 | 
May 22, 2019
March 31, 2020
 | 
Blog

Availability Bias in Cybersecurity

Availability Bias in Cybersecurity

by SecureCircle
 | 
May 1, 2019
March 31, 2020
 | 
Blog

How to Minimize Your Exposure to Employee Mistakes

How to Minimize Your Exposure to Employee Mistakes

by SecureCircle
 | 
April 9, 2019
March 31, 2020
 | 
Blog

A Look Inside Toyotas Second Data Breach

A Look Inside Toyotas Second Data Breach

by SecureCircle
 | 
April 3, 2019
March 31, 2020
 | 
Blog

Asymmetric Information Causes Data Breaches

Asymmetric Information Causes Data Breaches

by SecureCircle
 | 
March 6, 2019
March 31, 2020
 | 
Blog

The Financial Consequences of a Data Breach

The Financial Consequences of a Data Breach

by SecureCircle
 | 
February 27, 2019
March 31, 2020
 | 
Blog

Insider Threats Can Happen to Anyone

Insider Threats Can Happen to Anyone

by SecureCircle
 | 
February 20, 2019
March 31, 2020
 | 
Blog

Federal Data Privacy Laws Are Coming

Federal Data Privacy Laws Are Coming

by SecureCircle
 | 
February 13, 2019
March 31, 2020
 | 
Blog

Forget Collection 1: Here comes Collections 2-5

Forget Collection 1: Here comes Collections 2-5

by SecureCircle
 | 
February 6, 2019
March 31, 2020
 | 
Blog

Collection 1: Not a Big Deal?

Collection 1: Not a Big Deal?

by SecureCircle
 | 
January 29, 2019
March 31, 2020
 | 
Blog

It All Adds Up: Better Cybersecurity is a Necessity in 2019

It All Adds Up: Better Cybersecurity is a Necessity in 2019

by SecureCircle
 | 
January 23, 2019
March 31, 2020
 | 
Blog

Why New Year Resolutions Fail

Why New Year Resolutions Fail

by SecureCircle
 | 
January 15, 2019
May 21, 2020
 | 
Blog

9 Costly Security Mistakes

9 Costly Security Mistakes

by SecureCircle
 | 
January 8, 2019
March 31, 2020
 | 
Blog

2019 Security Predictions(Infographic)

2019 Security Predictions(Infographic)

by SecureCircle
 | 
December 11, 2018
March 31, 2020
 | 
Blog

We love what we do - 2018 Review (Infographic)

We love what we do - 2018 Review (Infographic)

by SecureCircle
 | 
December 4, 2018
March 31, 2020
 | 
Blog

Holiday Hacks Are Not Going Away

Holiday Hacks Are Not Going Away

by SecureCircle
 | 
November 29, 2018
March 31, 2020
 | 
Blog

Solving Multi-Cloud Security

Solving Multi-Cloud Security

by SecureCircle
 | 
November 6, 2018
March 31, 2020
 | 
Blog

A better solution than web bugs for internal visibility

A better solution than web bugs for internal visibility

by SecureCircle
 | 
October 30, 2018
March 31, 2020
 | 
Blog

Why File Encryption is not enough - A Customer Conversation

Why File Encryption is not enough - A Customer Conversation

by SecureCircle
 | 
October 23, 2018
March 31, 2020
 | 
Blog

Security, Visibility, and Control

Security, Visibility, and Control

by SecureCircle
 | 
October 16, 2018
March 31, 2020
 | 
Blog

Healthcare Needs a Change

Healthcare Needs a Change

by SecureCircle
 | 
October 9, 2018
May 21, 2020
 | 
Blog

What is old is new: Cold Boot Attacks

What is old is new: Cold Boot Attacks

by SecureCircle
 | 
September 25, 2018
March 31, 2020
 | 
Blog

Inside Information - Data that should NEVER leave the organization

Inside Information - Data that should NEVER leave the organization

by SecureCircle
 | 
September 18, 2018
March 31, 2020
 | 
Blog

Insider Threats

Insider Threats

by SecureCircle
 | 
September 11, 2018
March 31, 2020
 | 
Blog

Opt-Out is more than blocking SPAM

Opt-Out is more than blocking SPAM

by SecureCircle
 | 
August 28, 2018
March 31, 2020
 | 
Blog

What is Opt-Out Data Centric Protection? And why is it so important

What is Opt-Out Data Centric Protection? And why is it so important

by SecureCircle
 | 
August 21, 2018
March 31, 2020
 | 
Blog

Digital Hygiene in a GDPR World

Digital Hygiene in a GDPR World

by SecureCircle
 | 
August 16, 2018
June 19, 2020
 | 
Blog

A year ago, digital hygiene recommendations would have been updating your password, backing up your data, making sure all your apps & operating systems were upgraded.

GDPR Readiness (Infographic)

GDPR Readiness (Infographic)

by SecureCircle
 | 
August 9, 2018
March 31, 2020
 | 
Blog

The Lost Laptop

The Lost Laptop

by SecureCircle
 | 
August 7, 2018
March 31, 2020
 | 
Blog

Reading Between the Lines - The Real Impact of Insider Threat (Infographic)

Reading Between the Lines - The Real Impact of Insider Threat (Infographic)

by SecureCircle
 | 
August 2, 2018
March 31, 2020
 | 
Blog

Protecting Internal Data

Protecting Internal Data

by SecureCircle
 | 
July 31, 2018
May 21, 2020
 | 
Blog

Press & News Embargos

Press & News Embargos

by SecureCircle
 | 
July 24, 2018
March 31, 2020
 | 
Blog

SecureCircle @ CIAB FEBRABAN, Sao Paulo Brazil - The Recap

SecureCircle @ CIAB FEBRABAN, Sao Paulo Brazil - The Recap

by SecureCircle
 | 
July 17, 2018
March 31, 2020
 | 
Blog

California Consumer Privacy (The next generation of GDPR)

California Consumer Privacy (The next generation of GDPR)

by SecureCircle
 | 
July 10, 2018
March 31, 2020
 | 
Blog

I am safe. My data is encrypted. Right?

I am safe. My data is encrypted. Right?

by SecureCircle
 | 
June 26, 2018
March 31, 2020
 | 
Blog

Is my Air Gapped Computer Safe?

Is my Air Gapped Computer Safe?

by SecureCircle
 | 
June 19, 2018
March 31, 2020
 | 
Blog

The Broken 80/20 Rule

The Broken 80/20 Rule

by SecureCircle
 | 
June 12, 2018
March 31, 2020
 | 
Blog

Throw Tech Away - The Rise of a New Generation of Data Security

Throw Tech Away - The Rise of a New Generation of Data Security

by SecureCircle
 | 
June 5, 2018
May 21, 2020
 | 
Blog

Are you ready for a password-less world?

Are you ready for a password-less world?

by SecureCircle
 | 
May 29, 2018
March 31, 2020
 | 
Blog

Account compromised? What about your file content?

Account compromised? What about your file content?

by SecureCircle
 | 
May 18, 2018
May 21, 2020
 | 
Blog

Age old discussion: Convenience versus Security

Age old discussion: Convenience versus Security

by SecureCircle
 | 
May 15, 2018
May 21, 2020
 | 
Blog

Data Protection needs to be agnostic like Switzerland

Data Protection needs to be agnostic like Switzerland

by SecureCircle
 | 
May 9, 2018
March 31, 2020
 | 
Blog

Facebook & Privacy

Facebook & Privacy

by SecureCircle
 | 
March 27, 2018
March 31, 2020
 | 
Blog

Fedex leaks 119,000 Customer Passports & Photo IDs

Fedex leaks 119,000 Customer Passports & Photo IDs

by SecureCircle
 | 
February 16, 2018
March 31, 2020
 | 
Blog

Apple iBoot Source Code in the Wild

Apple iBoot Source Code in the Wild

by SecureCircle
 | 
February 8, 2018
March 31, 2020
 | 
Blog

Tracking Data Leaks

Tracking Data Leaks

by SecureCircle
 | 
February 7, 2018
March 31, 2020
 | 
Blog

Not via Sonic the Hedgehog

Not via Sonic the Hedgehog

by SecureCircle
 | 
January 25, 2018
March 31, 2020
 | 
Blog

Cybersecurity isn't Going to Work Until it is Simple

Cybersecurity isn't Going to Work Until it is Simple

by SecureCircle
 | 
October 28, 2020
 | 
Blog

IBM recently reported in its fifth annual Cyber Resilient Organization Report 2020 that the average enterprise deploys 45 cybersecurity tools. Additionally, enterprises using over 50 tools ranked themselves 8% lower in their ability to detect threats and 7% lower in their defensive capabilities. Having more tools is no

Conditional Data Access for Endpoints

Conditional Data Access for Endpoints

by SecureCircle
 | 
October 29, 2020
 | 
Blog

Security Weekly hosts and the CEO of SecureCircle, Jeff Capone, dive into how we can have conditional data access for endpoints. "Most folks think about using Conditional access for SaaS applications or access to specific data sources. However, once that data is accessed how do you continuously enforce conditional acce

Securing Source Code on Endpoints

Securing Source Code on Endpoints

by SecureCircle
 | 
December 13, 2020
 | 
Blog

When deployed in a best practice configuration, SecureCircle can secure source code on endpoints without development teams needing to change how they operate or interact with code, IDEs, and development tools. This whitepaper focuses on SecureCircle best practices for securing source code in development environments.

Quanta Storage Inc. Secures Customer Intellectual Property

Quanta Storage Inc. Secures Customer Intellectual Property

by SecureCircle
 | 
November 30, 2020
 | 
Blog

QSI obtains customer intellectual property (IP) such as designs, roadmaps, costs, legal documents, and schedules. Customers are concerned about the safety of their IP. The IP includes traditional Office files, source code, mechanical design files, photos, videos, and more.

Zero Trust DLP Webcast

Zero Trust DLP Webcast

by SecureCircle
 | 
November 17, 2020
 | 
Blog

Security Weekly hosts and SecureCircle dive into Zero Trust DLP. Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. A zero-trust solution requires the owner of the data to always be in control at all times.

Where's Your Data? Who Cares!

Where's Your Data? Who Cares!

by SecureCircle
 | 
November 30, 2020
 | 
Blog

App, User, and Data, but it's all about the data! Discovering and classifying data to protect it is tough. What if you can protect all of your data? Jeff Capone, CEO and Co-founder at SecureCircle, joins Security Weekly to discuss how to protect all of your data and stop asking "Where's your data?". If we can protect

Zero Trust Data Security Webcast

Zero Trust Data Security Webcast

by SecureCircle
 | 
December 4, 2020
 | 
Blog

Security Weekly hosts and SecureCircle's CEO, Jeff Capone, discuss Zero Trust Data Security. SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. Ensure all your data is secure, without impacting the business.

Preventing Palmerworm Espionage

Preventing Palmerworm Espionage

by SecureCircle
 | 
December 4, 2020
 | 
Blog

SecureCircle helps eliminate data breaches from malicious external attacks such as Palmerworm and malicious and accidental insiders.

Companies Need to Protect Trade Secrets

Companies Need to Protect Trade Secrets

by SecureCircle
 | 
December 4, 2020
 | 
Blog

The road to a granted software patent continues to be a long, frustrating, and expensive process. In just a few years, old software can be replaced even before a patent application is complete. Typically, patent applications take about four years to complete, which is very time consuming for most companies. 

Is Zero Trust Data Security Possible?

Is Zero Trust Data Security Possible?

by SecureCircle
 | 
December 31, 2020
 | 
Blog

Some enterprises I've worked with that have deployed a zero trust (trust no one) model have still experienced data breaches. With zero trust implemented correctly, data breaches can be eliminated or minimized to small datasets.

2020 Recap

2020 Recap

by SecureCircle
 | 
December 21, 2020
 | 
Blog

2020 has by far been one of the most challenging years for many of us. With everything that has been occurring in our world, it most certainly has brought us a collective amount of uncertainty. Overall, this year has been a wild ride and will most definitely go down in history.

Protecting Data That Egresses From Cloud Services & SaaS Applications

Protecting Data That Egresses From Cloud Services & SaaS Applications

by SecureCircle
 | 
January 4, 2021
 | 
Blog

For a true Zero-Trust environment, it isn’t enough to think about data in cloud services and SaaS applications. We also must protect, control and audit data that egresses from these services onto endpoints.

2021 Cybersecurity Predictions

2021 Cybersecurity Predictions

by SecureCircle
 | 
January 3, 2021
 | 
Blog

As the calendar turns to a new year and we gladly put 2020 behind us, here are a few predictions for the new year.

Cybersecurity 2021 Conferences

Cybersecurity 2021 Conferences

by SecureCircle
 | 
January 19, 2021
 | 
Blog

Regular attendees are expecting to join the main Cybersecurity Conferences to be held this year even though they will mostly be in a virtual mode. SecureCircle lists here the top 10 conferences that you cannot miss.

Conditional Data Access for Endpoints

Conditional Data Access for Endpoints

by SecureCircle
 | 
January 19, 2021
 | 
Blog

Many people think about using Conditional access for SaaS applications or access to specific data sources. However, once that data is accessed, how do you continuously enforce conditional access "to the data" on an endpoint?

Zero Trust Data Security

Zero Trust Data Security

by SecureCircle
 | 
January 19, 2021
 | 
Blog

Even with costly and complex data protection programs in place, data breaches and insider threats are still continually occurring. A reimagined approach to data security needs to be taken to mitigate these threats. Zero Trust is a security concept that requires the owner to have full control over every aspect of their

Move Beyond DLP's Failures

Move Beyond DLP's Failures

by SecureCircle
 | 
February 2, 2021
 | 
Blog

DLP (Data Loss Prevention) solutions haven’t stopped data breach growth. IBM reports the average total cost of a data breach reached $3.86 million USD in 2020. DLP solutions only block or encrypt data that tries to leave the endpoint.

Where's Your Data? Who Cares!

Where's Your Data? Who Cares!

by SecureCircle
 | 
January 25, 2021
 | 
Blog

Discovering and classifying data to protect it is challenging. Many of us tend to wonder, “Where is our data?” However, what many of us do not realize is that it does not matter where our data is, but how it is being protected.

The Zero Trust Data Journey (0 to Zero Trust in 2 steps)

The Zero Trust Data Journey (0 to Zero Trust in 2 steps)

by SecureCircle
 | 
February 28, 2021
 | 
Blog

What is Zero Trust? Many companies have adopted Zero Trust as their security framework. Zero Trust requires all users, even those inside the organization's enterprise network, to be authenticated, authorized, and continuously validating security configuration and posture before being granted or keeping access.

HIPAA & NIST 800-111

HIPAA & NIST 800-111

by SecureCircle
 | 
February 1, 2021
 | 
Blog

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient's consent or knowledge.

Microsoft AIP Doesn’t Measure Up

Microsoft AIP Doesn’t Measure Up

by SecureCircle
 | 
February 16, 2021
 | 
Blog

Data security is a measure twice, cut once type of activity. Mistakes in data security are expensive. IBM's recent Cost of a Data Breach report states that the US's average data breach costs companies $3.84 million. Many data security solutions have a fatal flaw that creates a risk for data loss.

Zero Trust DLP

Zero Trust DLP

by SecureCircle
 | 
February 25, 2021
 | 
Blog

Zero Trust Data Security is a prevalent security architecture that is being adopted by many organizations today. A zero-trust solution requires the owner of the data to always be in control at all times. Before Zero Trust protection was even in the picture, DLP was the leading data security solution

The Future of Password Security | The Cybrary Podcast Ep. 54

The Future of Password Security | The Cybrary Podcast Ep. 54

by SecureCircle
 | 
February 28, 2021
 | 
Blog

Joining the Cybrary Podcast this week is Jeff Capone, CEO & Co-founder of SecureCircle. In this episode, Jeff, Mike, and Jonathan discuss zero-trust policies, why people use encryption, and what it would mean for data access, privacy, and security if we could make the need for passwords obsolete.

DASB Replaces DLP

DASB Replaces DLP

by SecureCircle
 | 
June 19, 2020
 | 
Blog

FSC has been mandated to protect sensitive financial and personal information for mandatory compliance requirements. In particular, FSC wants to protect and track sensitive data as soon as it is accessed from their SQL databases and transformed into flat files stored on their file servers.

What Do Zoom, Dog Walkers, And Encryption Have In Common?

What Do Zoom, Dog Walkers, And Encryption Have In Common?

by SecureCircle
 | 
June 19, 2020
 | 
Blog

The secure solution to grant access to the house without giving up control requires a broker to decide when the door should be unlocked. With today’s modern physical security tools, biometrics grants access.

Modern Encryption from the Beginning : The Split-Key

Modern Encryption from the Beginning : The Split-Key

by SecureCircle
 | 
June 19, 2020
 | 
Blog

Today we can experience a whole new world of encryption due to a man who led the way in cryptography. Thanks to Whitfield Diffie and his invention of public-key cryptography, we started down a path to provide privacy over digital communications and commerce.

Avoid The High Cost Of Data Loss Prevention (DLP)

Avoid The High Cost Of Data Loss Prevention (DLP)

by SecureCircle
 | 
June 19, 2020
 | 
Blog

SecureCircle measures successful implementation in days and weeks. Our customers have complained that DLP and Information Rights Management (IRM) solutions have taken quarters to years to implement, if at all.

DASB Vs. DLP: Operational Overhead

DASB Vs. DLP: Operational Overhead

by SecureCircle
 | 
June 19, 2020
 | 
Blog

By deploying an opt-out, protect by default solution, organizations can reduce the amount of time spent on maintaining DLP solutions and reduce data breaches caused by incomplete, insufficient, outdated, or conflicting policy rules. SecureCircle's DASB prevents data breaches and insider threats.