Armour Comms launches first secure Voice over IP... » London: Armour Communications has announced its integration with Skype for Business. Armour Mobile i... Anam Technologies selected by Deutsche Telekom a... » DUBLIN, BONN:  Anam Technologies has gone into partnership with Deutsche Telekom International Carri... 6.7 percent of programmes on private UK PCs are en... » Maidenhead, U.K: The average private user in the UK has 72 programmes installed on their PC, and 6.7... Multitone’s EkoSecure Personal Alert System chos... » Multitone Electronics plc has announced that its German-based team, Multiton Elektronik GmbH, has su... IoT 2020: Smart and secure IoT platform » Geneva, Switzerland: The Internet of Things (IoT) significantly impacts the global economy and is ex... Letterbox company to keep properties safe with inn... » A specialist mailbox manufacturer has made a pledge to enhance the security of UK properties through... MDS expands portfolio of cost analytics solution... » Warrington, UK: MDS has announced the launch of a suite of cost efficiency analytic solutions design... Post-Truth, Post-West, Post-Order? » Munich Security Report 2017 With Foreword By Ambassador Wolfgang Ischinger, Chairman of the Munich ... NuData Security comments on fraud costing the UK £... » Crowe Clark Whitehill has just released its Financial Cost of Fraud report  which states that fraud ... Edesix selected as body worn camera provider for U... » Edinburgh-based Edesix Ltd. has been selected as the Body Worn Camera provider of choice for Her Maj...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

London: Reacting to a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm. “Organisations are losing track of where their critical data is stored, so controlling, monitoring and auditing that data is becoming more and more difficult. IT must be able to offer the functionality that its end users need to collaborate, but without losing control”, says David Gibson, VP of Strategy with the data governance specialist.

 

"I've actually lost count of the number of times this New York Times business editorial references leading edge IT concepts such as apps and cloud services, but the reality is that - as witnessed by the business pages this article appears - this really is the new norm. This creates a raft of security headaches in the shape of unsecured devices, as well as the aforementioned leak apps and cloud services. And it's against this backdrop that critical data needs to be identified, managed and protected with an effective data governance platform - without hindering employees’ work," he says.

"I think it's very revealing that the NYT feature notes that, even without proof of compromised accounts, data losses can prove costly in terms of money and reputation - especially given that the US Securities and Exchange Commission mandates that data leaks caused by unsecured devices, leaky apps or poor cloud security, must be announced publicly if the information potentially affects a company’s share price," he added.