By E.K. Koh, VP of Solutions at NextLabs |
The direct financial costs include future loss of revenue when trade secrets are stolen today. According to the Battelle Foundation report “2013 Global R&D Funding Forecast”, the financial costs of intellectual property theft – internal and external – are compounded over time. When trade secrets are stolen, so is the future revenue that would come from licensing and sales of the research and of the products created. more “What are the Financial Costs of Data Loss?”
By E.K. Koh, VP of Solutions at NextLabs
There has been a lot of talk about how data breach is exponentially increasing. In a recent NIST cyber security framework, there is an entire segment on “Protecting” Data. more “Protecting Against Data Breach – what offers the best bang for your buck?”
By Sudhindra Kumar, Principal Software Engineer at NextLabs
In my previous blog, we discussed about Data Governance Policies and Regulatory Compliance.
In this post, we’ll see some of the options available to protect data at rest and in transit. A few years ago, protecting data in transit was considered more important than protecting data at rest. However, with the proliferation of Internet and cloud technologies, and the subsequent issues related to data breaches have put the spotlight on protecting data at rest as well. Let us take a look at different solutions for protecting data at rest and in transit: more “Cloud Security – Protecting data at rest and in transit – Information Risk Management for the Cloud”
By E.K. Koh
In my last blog, Would data-level controls have stopped Snowden, I highlighted the importance to separate system rights from data rights. But what if Snowden was using a login credential that in fact grants him rights to sensitive data? Accounts vary, but in the blog What the Snowden affair taught us , Anand alluded to the fact that Snowden gained access by stealing credentials of users with higher privilege. Unfortunately, even a system with fine grained data entitlement capabilities will not be able to stop Snowden, under his new identity, from copying sensitive data. more “Can we turn off Snowden’s access after the fact?”
By Sandeep Chopra.
“Attributes” is the new Role?
In the last Gartner Identity and Access Summit in Nov 2013, Gregg Kreizmann, Research VP in Gartner, made a prediction that by 2020, 70% of all businesses will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from <5% today.
In Oct 2013, NIST published their report titled “Guide to Attribute-based Access Control Definition and Consideration”, which we discussed in an earlier blog. This is recognition that organizations, including the federal government, need to govern how information is shared across systems, applications, and organizations. more “Attributes is the new role?”
By Sandeep Chopra
Design and engineering organizations consistently describe controlling sensitive product data as a top IT priority. However, trends in product collaboration technologies are creating new risks to securing product data. As PLM applications evolve into more complex ecosystems, design engineering teams are empowered to collaborate in new ways. But as collaboration becomes more fluid, and process more agile, product data is exposed to more risk. more “Challenges to Secure Product Collaboration in PLM Applications”
Cloud computing has metamorphosed from being a niche concept to one of the fastest growing segments in the IT industry. According to Gartner’s report on cloud services, End-user spending on public cloud services is expected to record a compound annual growth rate of 17.7% from 2011 through 2016. While cloud computing helps businesses become more agile and cost-efficient, it comes packaged with an assortment of challenges. Paramount amongst them is the safety and security of the data in the cloud. This is even more significant in the wake of incidents like the infamous NSA leaks by Edward Snowden. Data security is in fact considered the biggest hindrance for faster cloud adoption. more “Data Security in the Cloud”