Data Security Challenges for the Global A&D Supply Chain

By E.K. Koh, VP of Solutions, NextLabs, Inc.

An interview with Luis F. Dannenfels, Senior Principal Architect, Raytheon

NextLabs recently sat down with Luis F. Dannenfels, Senior Principal Architect at Raytheon, to discuss the challenges that A&D companies face in the age of globalization and access anywhere, from any device. Luis talks about the challenges and the solutions. Below is an excerpt of the interview: more “Data Security Challenges for the Global A&D Supply Chain”

4 Ways IT must Change to Protect your Business

By E.K. Koh, VP of Solutions at NextLabs

It’s not your perimeter. It’s not your applications. In an age where there is no perimeter, where data moves from application to application, from servers to desktops to tablets and smart phones that the company does not even own, managing security at the perimeter or application is essential, but not sufficient. What is your value at risk? It is your DATA.

Data is Valuable

In a survey by Forrester, companies noted that corporate secrets (or intellectual property) comprise 2/3 of their information portfolio, with 1/3 being customer custodial data. The figure below shows the relative value of different types of data rated on a million dollar scale: more “4 Ways IT must Change to Protect your Business”

What are the Financial Costs of Data Loss?

By E.K. Koh, VP of Solutions at NextLabs |

The direct financial costs include future loss of revenue when trade secrets are stolen today. According to the Battelle Foundation report “2013 Global R&D Funding Forecast”, the financial costs of intellectual property theft – internal and external – are compounded over time. When trade secrets are stolen, so is the future revenue that would come from licensing and sales of the research and of the products created. more “What are the Financial Costs of Data Loss?”

Can we turn off Snowden’s access after the fact?

By E.K. Koh

In my last blog, Would data-level controls have stopped Snowden, I highlighted the importance to separate system rights from data rights. But what if Snowden was using a login credential that in fact grants him rights to sensitive data? Accounts vary, but in the blog What the Snowden affair taught us , Anand alluded to the fact that Snowden gained access by stealing credentials of users with higher privilege. Unfortunately, even a system with fine grained data entitlement capabilities will not be able to stop Snowden, under his new identity, from copying sensitive data. more “Can we turn off Snowden’s access after the fact?”