Sort By Date
    Fasoo Expands Data Security to Auto Supply Chain with Mando Project
    October 22, 2018
    Data security firm Fasoo has completed an enterprise digital rights management deployment project for Mando, expanding its foot print into the global auto parts supply chain.
    Fasoo's Wrapsody offers behavioral analytics for max workspace output
    May 18, 2018
    Fasoo says its Wrapsody enterprise document platform has evolved to a workspace collaboration tool that minimizes ROT information and maximizes worker performances with behavioral analytics.
    Fasoo Named in Top 25 Collaboration Companies 2018
    May 18, 2018
    "Fasoo brings to the table a modern, intuitive enterprise collaboration solution, Wrapsody, which solves issues with information management, information silo, and ROT information" Fasoo's founder, Dr. Cho, is interviewed by CIO Magazine about Fasoo's recent award.
    Taking a Data-Centric Approach to Today’s Security Landscape
    November 15, 2017
    Today’s security landscape continues to evolve, as yesterday’s security protocols are simply not up to par with the advanced threats that organizations are facing on a regular basis. Even the most amateur cybercriminal can carry out an attack with the result being the acquisition of an organizations’ high valued information, leaving an expensive remediation path in its midst. So, just how prepared are you?
    Cybersecurity Predictions for 2017: The Experts Speak
    January 10, 2017
    Fasoo Chief Customer Officer Bill Blake stated that, "In the past, in the aftermath of major data breaches, organizations looked to manage bad press. Crisis management in 2017 will include a reckoning with the law. Some state officials have already made inroads to enact cyber regulations - in New York for example - looking to hold senior management and board of directors accountable."
    Marketing Tighter Security
    November 29, 2016
    Fasoo's Ron Arden discusses how today’s threats are becoming increasingly more advanced, leading to large scale cyberattacks and thousands of credit card information available for sale.
    Why don't developers have a 'spellchecker' for security?
    November 2, 2016
    Eliminating these basic vulnerabilities would go a long way towards making software more secure. And the earlier on in the process they're caught, the easier they are to fix. Today's integrated development environments can already catch common syntax errrors, like missing semicolons, said Ron Arden, COO at security vendor Fasoo. "If there's a function you're using, it shows the parameters," he added. "But it won't tell you if there's a SQL injection or cross-site scripting or something stupid like that."
    Keep Your High-Value Information Close - And Your Employees Closer
    September 4, 2016
    High value information—including trade secrets, product designs, merger and acquisition activity, financial data, confidential business information and the like—is often the prize for external malicious actors, but careless internal employees may unknowingly make the break-in much easier. The recent Ponemon study, “Risky Business: How Company Insiders Put High-Value Information at Risk,” found that 73 percent of the almost 700 IT security practitioners polled said their organization lost confidential information in the last year. Even more alarming, 59 percent admitted not being confident in their ability to prevent data leakage by an employee.
    Survey finds most companies can't protect confidential documents
    June 20, 2016
    "What should be concerning to C-level executives and corporate boards is that most organizations have no idea where mission-critical information is located on the corporate network, who has access and what they are doing with that information," said Bill Blake, President of survey sponsor Fasoo, a provider of file-based security solutions.