Blog

RSA 2016 Attendees Excited About Fasoo Data Security Framework
Data breach Data security News

Fasoo wows RSA 2016 visitorsThis year’s RSA Conference in San Francisco gave security professionals, executives and other attendees a lot to choose from as they tried to help their organizations prevent cyberattacks and mitigate the risk of insider threats.  Apple’s current flap with the FBI on encryption was a big point of discussion throughout the event, including during keynotes.  Amit Yoran, the President of RSA, came out strongly against government backdoors and weakening encryption.

Fasoo’s theme this year was Design Your Data Security Blueprint and visitors to the Fasoo booth got to see how the Fasoo Data Security Framework and Sparrow could help them achieve their goal of protecting their sensitive data from getting into the wrong hands.

A lot of conversations centered on the understanding that it’s not a matter of if I get hacked, but when.  I spoke to one gentleman who was talking about the concept of security crumple zones where you assume that some layers of your security will get breached.  The concept is similar to car safety, where the ultimate goal is protect what is most valuable.  Fasoo was showing attendees a multi-layered approach to data security that relies on a data-centric security model with people-centric policies.  This allows an organization to protect critical data immediately and adjust access control policy as roles and people change.

Fasoo is a Proud Champion of Data Privacy Day
News Privacy

Fasoo is a Proud Champion of Data Privacy DayFasoo attended “The State of Privacy” event at The Pew Charitable Trusts in Washington, DC on January 28, 2016 as part of Data Privacy Day. The luncheon and event was sponsored by the National Cyber Security Alliance (NCSA) to help raise awareness and dialogue on managing privacy in the US and internationally.

On January 27, 2014, the 113th U.S. Congress adopted S. Res. 337, a nonbinding resolution expressing support for the designation of January 28 as “National Data Privacy Day.”  Respecting Privacy, Safeguarding Data and Enabling Trust is the theme for Data Privacy Day (DPD), an international effort held annually on January 28 to create awareness about the importance of privacy and protecting personal information.

TJ Kwon Speaks to KOCSEA Technical Symposium on Data Security
Cybersecurity Data breach Insider threat News

TJ Kwon, Fasoo CTO, speaks to KOCSEA Technical Symposium on data securityTJ Kwon, Vice President and CTO of Fasoo, Inc., participated in a Cyber Security session at the 16th KOCSEA Technical Symposium at Harvey Mudd College in Claremont, CA on December 10, 2015.  TJ’s presentation was entitled “Fasoo, Security Framework for enterprise document security” where he discussed using the framework as the best way to protect and control sensitive documents from getting into the hands of hackers and other unauthorized users.

Fasoo was a sponsor of the event that brings together academic and industry computer scientists and engineers to discuss numerous technical topics that affect education, industry and government organizations.  The symposium also provided a venue that spurs collaborative research among industry and academic graduate researchers.

Ron Arden Shows Rochester IIA ISACA IT Event How to Protect Sensitive Data
Cybersecurity Data breach Insider threat News Secure collaboration

Ron Arden Shows Rochester IIA ISACA IT Conference How to Protect Sensitive DataRon Arden, Vice President of Fasoo, Inc., spoke to members of the Rochester Institute of Internal Auditors (IIA) and Information Systems Audit and Control Association (ISACA) at the Hilton Double Tree Hotel in Rochester, NY on December 10, 2015.  Ron delivered a presentation on “Data Protection of Sensitive Information” to this annual event and showed attendees how to use Fasoo’s enterprise digital rights management to protect sensitive information from insider threats and external attacks by hackers.

Given the constant drum beat of news on data breaches and cyber security incidents, the attendees were very interested in how to protect sensitive information in their organizations, since ensuring proper controls and managing risk are the main focus of this group.  A number of attendees came up after the presentation and asked about protecting very sensitive documents in their companies.  I spoke with a gentleman from a retail company who was concerned about protecting contract information with their suppliers and since they have such high employee turnover, was worried about people moving to competitors with sensitive information.

Bill Blake Presents to Institute of Internal Auditors on Fraud Prevention
Data security Insider threat News

Bill Blake presents to Institute of Internal Auditors on fraud preventionBill Blake, President of Fasoo, Inc., presented “Closing the Threat Gap: A 21st Century Approach to Minimizing Risk” at the Rochester Institute of Internal Auditors 2015 Fraud Event at Mario’s Restaurant in Rochester, NY on November 20, 2015.

The conference focused on how to detect and prevent fraudulent activities in companies regardless of size.  In today’s high-risk environment members of finance departments need to be vigilant to detect suspicious activities from both inside the company and external sources. Bill highlighted how Fasoo’s data-centric security can offer the best level of protection for confidential information from insider threats and hackers.

Fasoo Extends Data Security at IBM Insight 2015
Data breach Insider threat News

Fasoo Extends Data Security at IBM Insight 2015This is the second year Fasoo participated in the IBM Insight conference in Las Vegas and by the reaction of customers, IBM employees and other vendors, we made a big splash.  Enterprise Digital Rights Management and data-centric security for sensitive information appear to be at the top of many people’s minds.

The event had over 13,000 attendees from all over the world and focused on Analytics, Big Data, Content Management, Information Governance and Security.  There was a major focus on using analytics to understand and predict trends for business and to help eliminate security threats.  Cloud and mobile transcend these categories as business has become mobile, fluid and unfortunately more dangerous.  There was also a big presence of the Internet of Things, as more organizations are extending business models through wearable and more autonomous devices.