EContent | How to Protect Your WordPress Site from Keylogger MalwareEContent | How to Protect Your WordPress Site from Keylogger Malware
May 1, 2018
May 4, 2020

EContent | How to Protect Your WordPress Site from Keylogger Malware

It’s probably not surprising that WordPress powers 30% of the internet. But you may be surprised to learn that, at the time of this writing, over 2,300 websites run on WordPress were infected by malware.

Read more

Read Article
News
The Entrepreneur Way: Not Not Failing Is Not an Option with Jeff CaponeThe Entrepreneur Way: Not Not Failing Is Not an Option with Jeff Capone
May 1, 2018
May 4, 2020

The Entrepreneur Way: Not Not Failing Is Not an Option with Jeff Capone

SecureCircle, which he co-founded in 2015. An award-winning executive leader with expertise in enterprise software development, network and storage solutions, and IoT applications, Jeff has a track record of founding and selling successful software companies.

Read more

Read Article
News
2018 Secure Campus Awards2018 Secure Campus Awards
May 1, 2018
March 31, 2020

2018 Secure Campus Awards

The Secure Campus Awards honor the outstanding achievements of security industry manufacturers whose products are considered particularly noteworthy in their ability to improve campus security.

Read more

Read Article
News
2018 Govies Awards2018 Govies Awards
May 14, 2018
March 31, 2020

2018 Govies Awards

The Govies Government Security Awards honor the outstanding government security products of the year. SecureCircle was honored in the category of encryption.

Read more

Read Article
News
SDxCentral | Four Security Myths You Need to ShakeSDxCentral | Four Security Myths You Need to Shake
May 14, 2018
March 31, 2020

SDxCentral | Four Security Myths You Need to Shake

There is no place – internally or externally – or type of data that is safe. If we embrace that truth, then we won’t be lulled into a false sense of security.

Read more

Read Article
News
MegaMinds AIthority Interview with Jeff CaponeMegaMinds AIthority Interview with Jeff Capone
May 14, 2018
March 31, 2020

MegaMinds AIthority Interview with Jeff Capone

SecureCircle’s patent-pending Transparent File Encryption solution is designed to transparently protect unstructured data in any form.

Read more

Read Article
News
Security Today | Digital Security in a Zero Trust WorldSecurity Today | Digital Security in a Zero Trust World
May 14, 2018
March 31, 2020

Security Today | Digital Security in a Zero Trust World

It’s a [Zero Trust] world where we can’t count on the security of our internal or external networks and instead need to change our mindset about how we think about safeguarding data.

Read more

Read Article
News
CSO | The Impact of Human Behavior on SecurityCSO | The Impact of Human Behavior on Security
May 25, 2018
March 31, 2020

CSO | The Impact of Human Behavior on Security

People should be the last thing in charge of cybersecurity. Remove people and add transparency and automation for true protection.

Read more

Read Article
News
GDPR Compliance Tips: The Top Experts SpeakGDPR Compliance Tips: The Top Experts Speak
May 31, 2018
March 31, 2020

GDPR Compliance Tips: The Top Experts Speak

After a year of researching, interpreting and understanding the GDPR compliance, the day of action has come and passed. However, many companies are still struggling to gain compliance requirements, and this is a top concern for many security experts.

Read more

Read Article
News
SecureCircle will be exhibiting at CIAB Sao Paulo Brazil June 2018SecureCircle will be exhibiting at CIAB Sao Paulo Brazil June 2018
June 6, 2018
March 31, 2020

SecureCircle will be exhibiting at CIAB Sao Paulo Brazil June 2018

SecureCircle will be exhibiting at CIAB Sao Paulo Brazil June 2018.

Read more

Read Article
News
CSO | GDPR: Where are we now?CSO | GDPR: Where are we now?
July 21, 2018
March 31, 2020

CSO | GDPR: Where are we now?

GDPR became the law of the land in Europe on May 25th. The impact has been felt across the globe… Who’s benefiting? Who’s suffering?

Read more

Read Article
News
Strategic Finance | Security in a World of Zero TrustStrategic Finance | Security in a World of Zero Trust
August 3, 2018
March 31, 2020

Strategic Finance | Security in a World of Zero Trust

SecureCircle CEO Jeff Capone explains the four key vulnerabilities of the traditional opt-in model and how to implement an opt-out data security model.

Read more

Read Article
News
Security Info Watch | Enterprises Beware: Cybersecurity Challenges in the CloudSecurity Info Watch | Enterprises Beware: Cybersecurity Challenges in the Cloud
August 11, 2018
March 31, 2020

Security Info Watch | Enterprises Beware: Cybersecurity Challenges in the Cloud

A new, innovative approach is the only guarantee of true security. In today’s data-driven world, the stakes are too high for a data breach. And time is of the essence, as hackers are continually inventing new ways to steal data. We must take a strategic approach focused on the realities of cloud-first enterprises to stay ahead of threats.

Read more

Read Article
News
CSO | The hidden security problem we all need to know aboutCSO | The hidden security problem we all need to know about
September 7, 2018
March 31, 2020

CSO | The hidden security problem we all need to know about

If you can anticipate how employees will work, you’ll have a better shot of preemptively preparing for it and protecting your critical data.

Read more

Read Article
News
CTimes | SecureCircle and Netbridge Distribution Partnership (Chinese)CTimes | SecureCircle and Netbridge Distribution Partnership (Chinese)
September 13, 2018
March 31, 2020

CTimes | SecureCircle and Netbridge Distribution Partnership (Chinese)

SecureCircle, a provider of always-on, opt-out cybersecurity data protection, today announced that Taiwan based NetBridge Technologies will serve as its Asia Pacific distributor. NetBridge, which provides network, storage, and security solutions for businesses, has signed on to distribute SecureCircle’s enterprise security product. (Article in Chinese)

Read more

Read Article
News
Security Today | Rethinking Access ControlSecurity Today | Rethinking Access Control
December 4, 2018
May 21, 2020

Security Today | Rethinking Access Control

It is a rough and tumble world out there and cybersecurity is being challenged by new and stronger threats every day. By implementing access control best practices to manage identities and access and data encryption, you will have strong weapons in your arsenal to fight cyber threats.

Read Article
News
Security InfoWatch | The Last Mile Security at the EdgeSecurity InfoWatch | The Last Mile Security at the Edge
December 18, 2018
March 31, 2020

Security InfoWatch | The Last Mile Security at the Edge

Computing at the edge brings greater mobility, flexibility, convenience and other benefits to organizations, but at the same time, poses greater risks for cybersecurity professionals. By planning cybersecurity practices thoughtfully to secure the data itself, you can protect it at the edge and anywhere it goes.

Read more

Read Article
News
Forbes | 10 Industries On The Cusp Of Technological DisruptionForbes | 10 Industries On The Cusp Of Technological Disruption
February 5, 2019
March 31, 2020

Forbes | 10 Industries On The Cusp Of Technological Disruption

Data protection and privacy have been headlines for years without any significant pushback from cybersecurity vendors. Solutions were based on endpoints or networks. 2019 will see the adoption of data-centric solutions protecting data in all forms, across all devices, including the cloud. IT will have full visibility, security and control of data, just as if the data was on a central file server.

Read more

Read Article
News
Four Keys to Data-Centric Data ProtectionFour Keys to Data-Centric Data Protection
March 11, 2019
May 22, 2020

Four Keys to Data-Centric Data Protection

Data protection solutions such a firewall, network data loss prevention (DLP), endpoint DLP, information rights management IRM, classification, file encryption and others have tried to solve the growing data protection needs of organizations of all sizes.

2017 was a record year for the number of data breaches in the United States at 1,579, which represents a 44% increase from the previous year. Over six million records are lost or stolen every day.

Legacy data protection solutions are not doing enough to protect organizations from data breaches. The answer to every organization’s problem has been sitting right in front of it the entire time: the data itself. Organizations need to move to new data-centric data loss prevention solutions on the market.

A data-centric approach to data security is focused on the information that needs protection instead of the network, device or application. Legacy network, device or application-based solutions only protect information during a portion of the data’s life cycle.

Additionally, legacy data protection solutions have followed the discover, classify and protection mindset, in which organizations protect only a subset of data. This mindset became the norm because legacy protection solutions were so manual and cumbersome that organizations just wanted to apply protection to the smallest amount of data possible. With data-centric solutions, discovery and classification are not required. All data can be protected by default, eliminating the need for users to apply for protection manually.

Read Full Article on Forbes.com

Read Article
News
Disruptor Daily | What is the future of cybersecurity? Experts share their insightsDisruptor Daily | What is the future of cybersecurity? Experts share their insights
June 26, 2019
March 31, 2020

Disruptor Daily | What is the future of cybersecurity? Experts share their insights

Most modern citizens have accepted the risks of putting their entire lives into the digital ether. Data breaches, identity theft, and mass leaking of, well, sensitive photographs hasn't curbed our willingness to store our most sensitive data on the web. Hackers have noticed, and they've held individuals and entire companies hostage through the use of ransomware and related threats. So, what's to be done?

Read more

Read Article
News
Disruptor Daily | What trends are shaping cybersecurity in 2019?Disruptor Daily | What trends are shaping cybersecurity in 2019?
June 29, 2019
March 31, 2020

Disruptor Daily | What trends are shaping cybersecurity in 2019?

Today, insider threats can be eliminated by adopting data-centric data protection. Legacy data protection solutions focused on networks, endpoints, files and disks. Those solutions did not protect information as it moved from one device or medium to another.

Read more

Read Article
News
End Insider Threats Without Impacting Users Or Business WorkflowEnd Insider Threats Without Impacting Users Or Business Workflow
August 8, 2019
May 22, 2020

End Insider Threats Without Impacting Users Or Business Workflow

Today, insider threats can be eliminated by adopting data-centric data protection. Legacy data protection solutions focused on networks, endpoints, files and disks. Those solutions did not protect information as it moved from one device or medium to another. As a byproduct of this paradigm, data protection would attempt to block users from using "Save As" or copying a file to a USB drive. Legacy solutions attempted to jail data for the sake of security. Employees couldn’t do their work effectively, leading to a new threat — Shadow IT. This meant corporate IT didn’t even have visibility to how information was moving through the organization.

From what I've seen in my experience as a leader in enterprise software development, a new data-centric approach is required for today’s dynamic environment. Whether you refer to the world as Forrester’s Zero Trust, Google’s BeyondCorp or cloud-first, data protection, in general, must follow the data as it moves from one file to another, from one file type to another and be read and modified by applications and while being stored locally, centrally or in the cloud.

To ensure your company's data protection is up to par, here are four things to consider:

Read Full Article on Forbes.com

Read Article
News
CIO IT Taiwan | SecureCircle 控管檔案讀取 權不怕合作生變造成洩密CIO IT Taiwan | SecureCircle 控管檔案讀取 權不怕合作生變造成洩密
September 19, 2019
March 31, 2020

CIO IT Taiwan | SecureCircle 控管檔案讀取 權不怕合作生變造成洩密

過去幾年,儘管全球資安意識不斷提升,企業 亦不斷添購各類資安防護產品,但都無法有效防堵 資安威脅事件發生,乃至於發生大量商業機密或個 資外洩的事件。然而會造成資料外洩主因,多半源 自於公司內部防護機制不佳,根據統計僅有13%源 自於外部入侵竊取,另外有23%屬於使用者的惡意 行為,剩餘64%則是疏忽或意外造成的洩密

Read full article

Read Article
News
SecureCircle Launches to Bring Ubiquitous, Transparent Security to Unstructured DataSecureCircle Launches to Bring Ubiquitous, Transparent Security to Unstructured Data
December 11, 2017
May 21, 2020

SecureCircle Launches to Bring Ubiquitous, Transparent Security to Unstructured Data

MOUNTAIN VIEW, Calif., Dec. 11, 2017 /PRNewswire/ — SecureCircle, a leader in unstructured data security for cloud-first enterprises, today announced the launch of its flagship security product, SecureCircle, which is the first security product designed to meet the challenges of securing and managing unstructured data in a “zero-trust” world. Differing from other Data Security and Access Control solutions, SecureCircle automatically detects and transparently protects data no matter the form it takes throughout its lifecycle.

The company takes a completely different approach to data security than other solutions on the market. Instead of deciding which files or content to protect, SecureCircle protects them all, allowing administrators to select which items to remove. This zero trust approach doesn’t require user involvement to keep the data safe and it takes into account the way data is realistically used and shared within organizations. It protects enterprises from both internal and external threats without altering the way users collaborate, share and use files.

“Securing unstructured data has become a major problem for enterprises today,” said Jeff Capone, SecureCircle co-founder and CEO. “It accounts for about 80 percent of an enterprise’s data and is growing at a fast clip – yet, it’s extremely difficult to control. While there are many solutions that can make a few important files “self-destruct,” they are only applicable as a second line of defense. Without a perimeter, enterprises need a new solution to protect their vast amount of unstructured data without requiring user adherence and with low IT overhead.”

The solution secures files by protecting the content within them, which are only accessible by approved devices. It protects the content within unstructured data files of any format and for use by any application, no matter where it resides — in the cloud, at home or office, desktop or mobile. Unlike existing technologies such as file encryption, disk encryption, Information Rights Management, Data Loss Prevention, and Cloud Access Security Brokers, SecureCircle provides complete security, reporting, and control for the massive number of unstructured data files within enterprises – ensuring that they are always encrypted, trackable and retractable.

At the center of SecureCircle is a patent-pending Transparent File Encryption solution designed to transparently protect unstructured data in any form. Files stay encrypted – at rest, in transit, or in use – regardless of where the data is stored. Additionally, SecureCircle can automatically protect derivative work, isolate data access to authorized applications, and adaptively protect data based on the source of the file, helping companies meet their data security and compliance requirements.

About SecureCircle
SecureCircle was founded in 2015 to help solve pressing industry challenges in cybersecurity. Its patent-pending Transparent File Encryption solution helps organizations ensure the security, visibility and control of unstructured data from internal and external threats, regardless of format or storage location. Unlike existing technologies, SecureCircle provides a completely transparent solution which is always encrypted, trackable, and retractable, helping organizations to effectively secure data in today’s cloud-first environment. SecureCircle helps companies within healthcare, finance, manufacturing, pharma, media, and government organizations meet data security and compliance requirements. Learn more at SecureCircle.com or follow us on Twitter and LinkedIn.

Press Contact:
Brooks Wallace, Hollywood Agency
brooks@hollywoodagency.com

Read Article
Press Releases
SecureCircle Adds Security Industry Veteran Ted Plumis to Advisory BoardSecureCircle Adds Security Industry Veteran Ted Plumis to Advisory Board
January 17, 2018
March 31, 2020

SecureCircle Adds Security Industry Veteran Ted Plumis to Advisory Board

MOUNTAIN VIEW, Calif., Jan. 17, 2018 /PRNewswire/ — SecureCircle, a leader in unstructured data security for cloud-first enterprises, today announced that industry veteran Ted Plumis is the newest addition to its advisory board. With more than 16 years in the information security space, Plumis brings his executive-level knowledge and experience in channel sales and partnerships to the SecureCircle leadership team.

“We are assembling a strong advisory team of industry experts, and are delighted to bring Ted on board,” said Jeff Capone, SecureCircle co-founder and CEO. “His insight into the channel and his business development expertise will be invaluable as we continue to expand our sales and marketing efforts in the enterprise security marketplace.”

Plumis is currently Vice President of Channels, Business & Corporate Development at Exabeam, a leader in the User Behavior Analytics space. Previously, Plumis was Vice President of Worldwide Channel and Service Provider Sales at Imperva, where he led the expansion of the global channel organization. Plumis is also a six-time winner of the CRN Channel Chief award.

“I’m excited to be a part of SecureCircle’s advisory board and contribute to the company’s growth and market strategy,” said Plumis. “SecureCircle’s unique solution is essential for helping enterprises address one of their most pressing problems — gaining control and visibility of their unstructured data from both internal and external threats.”

For more information on SecureCircle’s advisory board, visit www.securecircle.com.

About SecureCircle

SecureCircle was founded in 2015 to help solve pressing industry challenges in cybersecurity. Its patent-pending Transparent File Encryption solution helps organizations ensure the security,

visibility and control of unstructured data from internal and external threats, regardless of format or storage location. Unlike existing technologies, SecureCircle provides a completely transparent solution which is always encrypted, trackable, and retractable, helping organizations to effectively secure data in today’s cloud-first environment. SecureCircle helps companies within healthcare, finance, manufacturing, pharma, media, and government organizations meet data security and compliance requirements. Learn more at SecureCircle.com or follow us on Twitter and LinkedIn.

Press Contact:
Brooks Wallace, Hollywood Agency
brooks@hollywoodagency.com
(781) 749-0077

Read Article
Press Releases