Could Your Car Be Hacked? It’s More Possible Than You Think.

When you’re driving your car, you view it as something completely protected. You’re driving it, and if you’ve maintained it, it’s going to likely drive as it should. I recently spoke with a friend who said he views his car as a ‘black box’; he drives it, but he relies on his mechanic to tell him if something is wrong with it. The unfortunate reality is that now, even while you’re driving, your car could potentially be taken over by a rogue hacker.

While it may sound like something out of a spy thriller or sci-fi novel, over the last few years, hackers have found numerous ways to hack into a vehicle, from taking over the on-board navigation system through an unsecured WiFi network designed to look like a public network, to hacking into a local mechanic’s diagnostic system then using that system to access the car’s on-board diagnostics.  more “Could Your Car Be Hacked? It’s More Possible Than You Think.”

Policy Based Security for Microsoft Dynamics CRM

As corporate security, data sharing, and compliance requirements increase, managing access to customer data in Microsoft Dynamics CRM has become more important than ever.  These changing requirements can result in increased administration overhead and complexity.

NextLabs Enforcer for Microsoft Dynamics helps simplify this management by extending the existing Dynamics security model through attribute based policies.  more “Policy Based Security for Microsoft Dynamics CRM”

Addressing Common SharePoint Security Concerns with NextLabs – Part 3

In our previous posts (Part 1) (Part 2), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control.  Now that we have ensured the data in SharePoint is secure, how do we extend that security beyond SharePoint?

Users who are authorized to access sensitive data in SharePoint can download that data and share it with anyone outside of SharePoint.  The most common way to prevent this data from being shared with unauthorized users is through encryption and digital rights management. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 3”

Addressing Common SharePoint Security Concerns with NextLabs – Part 2

In a previous post (Part 1), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control. In this post we will review how we can use NextLabs Entitlement Manager for SharePoint to easily create a policy to address the example use case:

“As an example, a corporate security policy may state that only users located at offices in the United States can access documents in SharePoint with a classification of top secret. To accomplish this in SharePoint today would be a very manual process. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 2”

Addressing Common SharePoint Security Concerns with NextLabs – Part 1

SharePoint is a great collaboration platform but companies must balance the need to share data with increasing data security, compliance, and privacy concerns. These are some of the common SharePoint concerns we see when working with customers:

Permission management is decentralized

Every company typically uses a combination of either administrators managing permissions to sites or delegation of permission management to site owners. Each site has its own set of permissions to manage (and audit) which becomes even more complex as inheritance is broken. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 1”

Export Regulations & Cyber Compliance

What is Cyber Compliance?

In the context of this article, “Cyber Compliance” means ensuring the location, access and transfer of export-regulated data in IT networks and systems complies with export regulations. Cyber Compliance requires companies integrate export control requirements into IT architecture, administration and use.

Cyber Compliance differs from Cyber Security in that an environment may be secure, but not compliant. For example, if secure IT infrastructure is located in another country, housing export-regulated data within could result in an export violation. more “Export Regulations & Cyber Compliance”

Guy Bursell Shares About the Challenges of Data in the Extended Enterprise Ecosystem

NextLabs partners closely with Siemens to help protect Teamcenter PLM data across the extended enterprise. In the age of Industry 4.0, manufacturing has changed — intellectual property is shared with third party manufacturing partners. NextLabs Enterprise Digital Rights Management solution for Siemens Teamcenter provides the protection organizations need to ensure their intellectual property is secure. Guy Bursell, Siemens Teamcenter Product Manager, has shared this article that gives an in-depth look at the challenges and risks companies must consider across their entire engineering and manufacturing ecosystems. more “Guy Bursell Shares About the Challenges of Data in the Extended Enterprise Ecosystem”

The Need for Rights Management in PLM Todays

A Growing Problem

steal.jpgThe theft of Intellectual Property (IP) is estimated to inflict a cost that exceeds $225 billion in counterfeit goods pirated software and the theft of trade secrets, and could be as high as $600 billion annually to the U.S. economy alone. That is according to a 2017 update to The IP Commission Report.1

Co-chair of the bipartisan, independent Commission on the Theft of Intellectual Property (IP Commission) Admiral Dennis C. Blair, former Director of National Intelligence, states that “the massive theft of American IP—from companies and universities across the country, from U.S. labs to defense contractors, from banks to software companies—threatens our nation’s security as well as vitality. This report is just the latest reminder of its scale and critical importance. more “The Need for Rights Management in PLM Todays”