Edge Computing, IoT and Data Breaches

Edge Computing, IoT and Data Breaches In the era of high demand on data storage and organization, one of the most employed methods by firms to consolidate resources is edge computing. Edge computing is a method of optimizing cloud computing systems by performing data processing at the “edge”, the logical fringes of a network using computers and…
Read more

GTB Data Loss Protection Gives Users the Edge

GTB Data Loss Protection Gives Users the Edge The application of a robust data loss protection (DLP) program is vital for the secure function of organizations. The very real risk of a data leak is exponentialized by the sea of data transfers typically taking place in within a high performing firm today. Adoption of DLP…
Read more

The Encryption Burden of GDPR and the New York DFS

The Encryption Burden of GDPR and the New York DFS The persistently growing threat of cyber attack has begun to spur government agencies to enact security guidelines.  These guidelines will have a mounting effecting on private industry. The most pertinent additions to these official protocols are the European Union’s General Data Protection Regulations (GDPR) and…
Read more

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP Data loss prevention (DLP) programs play a vital role in an organization's information security strategy. DLP is essential for tracking a company’s volume of data and organizing it within security protocols. This includes classifying files / data streams to determine levels of secrecy and sensitivity, and placing transfer restrictions…
Read more