Dimension data helps police keep Tour de Yorkshi... » Tracking and data technology on police cars, motorcycles, and vans helped lead, surround, and follow... Al Murabit Security Services first Iraqi company... » Baghdad: Al Murabit Security Services (“AMS”) and its sister company Al Thaware Security Services (“... Optex Systems locks in $518,000 shipment to Brazil » RICHARDSON, TX: Optex Systems, Inc. has announced that it has completed its first shipments of its p... Schlemmer China receives technology award from D... » *Delphi Pinnacle Award 2016 Ningbo Schlemmer Automotive Parts Co., Ltd. has once again received a T... Carbon Black takes a NGAV leadership position wi... » Waltham, MA -- Carbon Black has announced its acquisition of Confer, a next-generation antivirus (NG... Barclays launches digital banking Hackathon with... » Barclays and MuleSoft Join Forces to Drive Innovation in Financial Services with APIs LONDON: Mule... Aeriandi expands scope of secure recording product... » OXFORD, UK and BOSTON, MA: Aeriandi has announced a new strategic partnership. The agreement will se... Comparitech.com tells VPN providers: Stop claimin... » LONDON, UK: Consumer security and privacy comparison and advice website, Comparitech.com, is calling... Pulse Workspace certified by Google for use with... » SAN JOSE, CALIF.: Pulse Secure, the leader in secure access solutions has announced certification of... KPMG LLP, Mindgrape, Grupo SIA and Softline Grou... » Maidenhead, U.K: Flexera Software has announced their 2015 Partner of the Year Awards. Accolades wer...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

London: Reacting to a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm. “Organisations are losing track of where their critical data is stored, so controlling, monitoring and auditing that data is becoming more and more difficult. IT must be able to offer the functionality that its end users need to collaborate, but without losing control”, says David Gibson, VP of Strategy with the data governance specialist.

 

"I've actually lost count of the number of times this New York Times business editorial references leading edge IT concepts such as apps and cloud services, but the reality is that - as witnessed by the business pages this article appears - this really is the new norm. This creates a raft of security headaches in the shape of unsecured devices, as well as the aforementioned leak apps and cloud services. And it's against this backdrop that critical data needs to be identified, managed and protected with an effective data governance platform - without hindering employees’ work," he says.

"I think it's very revealing that the NYT feature notes that, even without proof of compromised accounts, data losses can prove costly in terms of money and reputation - especially given that the US Securities and Exchange Commission mandates that data leaks caused by unsecured devices, leaky apps or poor cloud security, must be announced publicly if the information potentially affects a company’s share price," he added.