News

Sort By Date
  • READ MORE
    Taking a Data-Centric Approach to Today’s Security Landscape
    November 15, 2017
    Today’s security landscape continues to evolve, as yesterday’s security protocols are simply not up to par with the advanced threats that organizations are facing on a regular basis. Even the most amateur cybercriminal can carry out an attack with the result being the acquisition of an organizations’ high valued information, leaving an expensive remediation path in its midst. So, just how prepared are you?
  • READ MORE
    Cybersecurity Predictions for 2017: The Experts Speak
    January 10, 2017
    Fasoo Chief Customer Officer Bill Blake stated that, "In the past, in the aftermath of major data breaches, organizations looked to manage bad press. Crisis management in 2017 will include a reckoning with the law. Some state officials have already made inroads to enact cyber regulations - in New York for example - looking to hold senior management and board of directors accountable."
  • READ MORE
    Marketing Tighter Security
    November 29, 2016
    Fasoo's Ron Arden discusses how today’s threats are becoming increasingly more advanced, leading to large scale cyberattacks and thousands of credit card information available for sale.
  • READ MORE
    Why don't developers have a 'spellchecker' for security?
    November 2, 2016
    Eliminating these basic vulnerabilities would go a long way towards making software more secure. And the earlier on in the process they're caught, the easier they are to fix. Today's integrated development environments can already catch common syntax errrors, like missing semicolons, said Ron Arden, COO at security vendor Fasoo. "If there's a function you're using, it shows the parameters," he added. "But it won't tell you if there's a SQL injection or cross-site scripting or something stupid like that."
  • READ MORE
    Keep Your High-Value Information Close - And Your Employees Closer
    September 4, 2016
    High value information—including trade secrets, product designs, merger and acquisition activity, financial data, confidential business information and the like—is often the prize for external malicious actors, but careless internal employees may unknowingly make the break-in much easier. The recent Ponemon study, “Risky Business: How Company Insiders Put High-Value Information at Risk,” found that 73 percent of the almost 700 IT security practitioners polled said their organization lost confidential information in the last year. Even more alarming, 59 percent admitted not being confident in their ability to prevent data leakage by an employee.
  • READ MORE
    Survey finds most companies can't protect confidential documents
    June 20, 2016
    "What should be concerning to C-level executives and corporate boards is that most organizations have no idea where mission-critical information is located on the corporate network, who has access and what they are doing with that information," said Bill Blake, President of survey sponsor Fasoo, a provider of file-based security solutions.