The General Data Protection Regulation (GDPR) has been receiving much press the last couple years on both sides of “the pond” and for good reason. It impacts companies not just in Europe but potentially anywhere in the world.
We’re doing business in a world that’s increasingly globalized and intertwined, much more so than it’s ever been. Large multinational companies have offices throughout the globe. more “GDPR: A Lens into the Bigger Picture of Digital Transformation”
If you’re unfamiliar with dynamic authorization, be prepared for an epiphany of sorts. It could very well be the biggest little secret you’ve never heard of with respect to data security. What with all the cloud apps, mobile devices, Big Data, and productivity tools that consume our professional lives these days, legacy access control solutions are having a difficult time keeping pace. more “Why Dynamic Authorization Is a Big Deal in Data Security”
What is Cyber Compliance?
In the context of this article, “Cyber Compliance” means ensuring the location, access and transfer of export-regulated data in IT networks and systems complies with export regulations. Cyber Compliance requires companies integrate export control requirements into IT architecture, administration and use.
Cyber Compliance differs from Cyber Security in that an environment may be secure, but not compliant. For example, if secure IT infrastructure is located in another country, housing export-regulated data within could result in an export violation. more “Export Regulations & Cyber Compliance”
Buzz words always amaze me. I love them if I think I coined them I love them until I think they are old and tired, but no matter what they seem to have a life of their own. Business transformation and Digital business transformation are a very hot topic these days in the enterprise space, but what does Digital Business Transformation really mean:
- Mobile first and cloud-enabled
- Collaboration requirements include always on, with seamless access anywhere and anytime, 24/7
- Digitally connected supply chains for highly responsive or just-in-time production
- Hyper-connected and complex business applications that are iPhone easy to use
- Internet of Things and Big Data driving real-time data decision streams and massive data volumes
more “What is Digital Business Transformation…really?”
NextLabs routinely advises customers whose businesses handle Controlled Technical Data (CTD) such as ITAR, EAR, and data controlled by non-US Jurisdictions, to take a proactive, systematic approach to managing CTD throughout its lifecycle. Many of these enterprises have been in business for a number of decades, during which time they have created substantial CTD organically, and acquired additional CTD through various business transactions and transformations. The CTD routinely spans every type of electronic storage that has ever been used in the enterprise. A portion of this CTD, in some cases a substantial portion, has reached Legacy CTD status, which means that it is no longer actively used in the normal business operations of the enterprise. more “A Systematic Approach to Controlled Technical Data”
“Securing customer data in property and casualty insurance, life & savings, and asset management products is tantamount to protecting a company’s ethos. After all, organizations in this industry gain brand loyalty by promising to give customers’ “peace of mind,” which now includes maintaining the privacy and security of their information.
However, one leading global insurance company reports that another business mandate— offering best-in-class customer service—can pose challenges to the mandate to protect customer data. How does an organization provide anytime, anywhere access to services, while also protecting confidential customer data from unauthorized access and leak? more “Providing secure access to information for improved customer service while streamlining IT operations”