Getting Granular: Why You Need Granular Access Controls

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy, Secure collaboration

In my last post, I said “Without granular access controls, you can’t prevent a user from copying data from a file and pasting it into an email, for example. If you only encrypt a file and do not prevent copy and paste or printing, a user can easily compromise security.” And I meant it. Now,  you might be asking yourself …

Your Sensitive Data is at Risk: How Do You Manage Insider Threats?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy

Picture it.  Your employees access sensitive and confidential customer information every day so they can do their jobs. Once the data leaves the protected confines of an information repository, file share or cloud-based service, your authorized users can share it with anyone, do anything with it and compromise your customer’s confidential information or your intellectual property.  As a result, you …

I Want YOU…

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Mobile security, Print security, Privacy

To think about stronger data security and privacy protection! But first, I want you to think about the millions of heroes who have served our country. As we approach the 4th of July, I wanted to take a moment to recognize the heroes in the many branches of the U.S. Military.  From myself, and on behalf of the entire team …

Attended Gartner Security & Risk Management Summit? So did we!

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy, Secure collaboration

I have to say, being on the other side of the Gartner Security and Risk Management Summit was a combination of exciting, fun, and educational. The cool thing is that I still got to get up on stage and the bonus was to see all the hard work that goes into exhibiting. I think the Fasoo team did a fantastic …

Another day, another… $853K?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Privacy

This has been on my mind. A lot. Every day, I open my email to find news about how a company needs to pay a fine or a fee to either an individual or a regulator because data was leaked or stolen. This one in particular caught my eye because it is a classic example of data being accessed by …

Live Webinar: Overcoming Unstructured Data Security and Privacy Choke Points

David Kwag

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as …

Ok, the results are in!

Deborah Kish Data breach, Data security, Privacy Leave a Comment

Thanks to all of you who responded to my last blog post regarding unstructured data security and privacy topics you’d like to hear more about. Here’s a sampling: Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? …

What’s Next from Deborah’s Desk

Deborah Kish Cybersecurity, Data security, Insider threat, Print security, Privacy Leave a Comment

So, in my last post, I mentioned a series of webinars and thought this would be a good opportunity to provide a little preview into some of the topics we’re planning on discussing. Unstructured data, of course!  But what about it?  I’ll be discussing the challenges… kind of a “What I heard from you as a Gartner data security analyst” …

What’s New at Fasoo?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Privacy Leave a Comment

Me! After over 20 years with leading IT consultancy, Gartner, I am excited to announce that I have recently joined data security vendor Fasoo. At Gartner, my focus on enterprise data security and compliance challenges, products and technologies led me to really understand the significance of the “Wild Wild West” nature of unstructured data. On average, I advised 30 CISOs …

Is Encryption Really That Hard?

Ron Arden Cybersecurity, Data breach, Data security, Insider threat Leave a Comment

The problem today is sensitive information is leaking from organizations like a dripping faucet.  The recent Equifax data breach is just the latest example of a constant barrage of leaks in the news.  All the experts say the best way to stop data leaks is by encrypting sensitive data. So why isn’t everyone doing it?   What’s the problem?  New …