encryption

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
Categorization - Auto-Classification - Concept Searching

Part 2: Classification Versus Categorization?

Since one of our core competencies is classification/categorization, I was curious what Microsoft was using for their classification technology. In Part 1 of our Classification Versus Categorization? blog we looked at different words that meant the same thing.…

Read More
Security

It’s Not a Matter of If You will Have a Data Breach, but a Matter of When

In late January, MongoDB databases were hacked, 27,000 to be exact. They did not have password protection, nor did they have firewalls. Interestingly, MongoDB is the fourth most popular database, after Oracle, MySQL, and Microsoft SQL Server.…

Read More
Data Security

So You Think You’re Safe? Maybe ‘Strike Three, You’re Out’ is More Appropriate.

Businesses are making some poor decisions regarding security. The question asked in the article ‘Dangerous Assumptions that Put Enterprises at Risk’, by Kacy Zurkus, stacks up the evidence that many companies are confident in their security but shouldn’t be.…

Read More
Cyber Security

Are You Quite Sure Lightning Won’t Strike the Same Place Twice?

Organizations can no longer assume they won’t have a cyber security breach. Some pundits state that it is only a matter of when, not if.

The ramifications of a breach can range from internal and minor to external and catastrophic brand damage.…

Read More
Data Breaches

Concerned More About Money Than Security? Guess So.

I saw a graphic the other day that illustrated the 2017 budget for cyberattack victims, which I thought I would share.

Data Breaches

What surprises me is that breaches across industries are continually escalating.…

Read More
cyber attack - How Much is Your Share Value? It Just Went Down if You Had a Cyberattack

How Much is Your Share Value? It Just Went Down if You Had a Cyberattack

If you have publicly traded stock and have had a cybersecurity breach, the price of your shares has dropped – permanently. Did you know that?

For the report ‘The Cyber Value-Connection’, CGI worked with Oxford Economics to create a model that is claimed to have captured the damage done to share prices by a cyberattack.…

Read More
Data Security

Do Your End Users Care About Security? I Doubt It.

Security has become the greatest inhibitor to cloud adoption, and still looms as an unaddressed issue.

Organizations have invested significant sums to protect their perimeters, but are not deploying mechanisms that can stop a security incident from occurring internally.…

Read More

What does the IT, Finance, and Healthcare Industries All Share? A penchant for malware and data leaks.

What does the IT, Finance, and Healthcare Industries All Share? A penchant for malware and data leaks it seems. The cloud access security company Skyhigh Networks released its fifth quarterly Cloud Adoption and Risk Report (registration required) and found that the financial services industry is the second-riskiest vertical based on employee behavior.…

Read More

Bloomberg was wrong. Encryption would not have stopped Snowden.

CipherPoint is a partner of Concept Searching. This blog is well worth the read and provides value to any organization concerned with security.

The following blog was posted on the CipherPoint web site.

Read More