Making predictions in the information security space is always an interesting yet challenging task. The very nature of cybersecurity, with the velocity of vulnerabilities and new threat actor coalitions along with the shifting regulatory environment, requires organisations to stay vigilant and informed. Although we are at a point where new technologies such as AI and ML are grabbing a lot of the attention, a major change for 2019 onwards is focused on the bigger picture issue of trust. Although the concept of Zero Trust and its becoming the de-facto model for security controls has gained acceptance, the next 24 months…
Author: Scott Gordon
Data dissemination and file collaboration are natural parts of most business and operational workflows; thus, security must be an integral part of modern corporate workflow to protect sensitive information. While structured data, information contained in databases, is well protected in the confines of secure backend systems, unstructured data is a wholly different story. Files are presumed to be secure within the domain of access control network drives and folders controlled by enterprise content manager systems. Most IT professionals associate data and even file protection with backup and encryption technologies within their network or at the gateway. Unfortunately, the protection of…