Beware! Remote work and the variety of collaboration tools are making it easier than ever to access and share data, leaving sensitive information at risk from data vampires. Today, we share an old dark tale for you, but just as in Grimm’s fairy tales, the...
Classified Data Leaks Continue to be a Problem This week, the FBI announced it is investigating a classified data leak of U.S. intel on Israel’s plans to retaliate against Iran. The top-secret documents were exposed on the Telegram messaging app, and it’s unclear if...
All information is an attractive target for bad actors, but some data is inherently more valuable. Malicious, state-sponsored and hacktivist attacks constantly probe enterprise networks, seeking to infiltrate and find sensitive information in core enterprise systems....
Coauthored with Eva Galfi, CEO & Principal Consultant, International Trade Advisors Pty Ltd The Department of Commerce’s Bureau of Industry and Security (BIS) implements and enforces the Export Administration Regulations (EAR) to regulate the export, reexport and...
This Capabilities Matrix highlights how NC Protect provides the access control mechanisms defined in NIST SP 800-162 to add ABAC capabilities to the Microsoft environment while leveraging and enhancing your Microsoft security investments.