The Economics of Data and Information

“The Most Valuable Commodity I Know of is Information.” -Gordon Gecko, Wall Street (circa 1987) It is true that the initial basis of this blog is quoting a fictional character from the 1980’s. However, is Gordon Gecko right? Is information the most valuable commodity? According to the Economist, the world’s most valuable commodity is no longer oil, but data. There are all kinds of claims about what actually is the…

Theft of Intellectual Property Costs More than you Think

Corporate espionage is one of the least understood and most downplayed elements of cyber security. Most people focus on massive breaches involving personal or financial data and that the majority of these breaches are discovered by someone other than the victim organizations. The reason this happens is because the personal data is often sold on illicit marketplaces. Would we ever know the breaches occurred if the information was not sold…

Automating Cross-Platform Intelligence – The Next Evolution in Security Technology

Join InteliSecure, Forcepoint CISO Allan Alford, and Forcepoint VP of User & Data Security, Guy Filippelli, for a breakfast briefing highlighting cross-platform intelligence at RSA 2018. Learn more here. RSA 2018 will undoubtedly include a raft of announcements related to new point products or new capabilities from existing products. In fact, for the past decade or so, the major disruptions in the technology space have come from start-up companies introducing…

Properly Framing the Cost of a Data Breach with Executives and Boards

The origin of this blog was actually my research into building a rock-solid, indisputable return on investment (ROI) model for security programs and initiatives. However, the focus changed as I began poring over statistical models and global research to stitch together all of the elements I would need in order to weave together an amazing ROI tapestry. What I initially found, and what prompted this post, was a stagnant view…

GDPR: Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)

Many companies are currently in different stages of projects to comply with the European Union’s General Data Protection Regulation (GDPR) ahead of the May 2018 enforcement deadline. Many vendors and service providers speak generally about GDPR and often, in my view, over simplify solutions to issues that are raised. Rather than try to address the whole of the regulation, I want to speak specifically about a practical issue that most…

Are You Protecting What Matters Most?

This week has been special as InteliSecure launched our first ever Critical Data Protection Benchmark Survey. As the organization who has been deploying and managing DLP technologies longer than anyone else in the world, we are uniquely positioned to share our insights in an effort to help guide organizations down the path of protecting the most critical information in their organizations. The survey is designed to address some key areas…

Understanding Behavioral Analytics

What is Behavioral Analytics? According to Investopedia, Behavioral Analytics is “An area of data analytics that focuses on providing insight into the actions of people.” Contrary to many articles that I have seen, behavioral analytics is neither new nor overly technical. For millennia, those engaging in espionage and counter-intelligence have used behavioral analytics in order to study the behavior of their adversaries in order to identify patterns of behavior in…

The Future of Information Security

As we approach the end of the year, many of us are enjoying the holidays with our families and friends. As we prepare for the year to come, many of us are building lists of things we would like to see change as well as building a mental picture for what we expect the new year to bring. Those of us in Information Security are no different, and the things…

From the Office of the CTO: Rethinking the SSN in light of Equifax

It has been almost two weeks since Equifax announced that a cyber-attack potentially affected 143 million Americans in an unprecedented and massive data breach. According to the US Census Bureau, there were 125.9 million adult men and women in the United States as of 2014. With a population growth rate of approximately 2.9 million per year, it is a safe bet that if you have received credit for anything in…

Chinese Data Privacy Regulations

Disclaimer: Neither InteliSecure nor the author of this post is purporting to offer legal advice in this blog. The author is not an attorney nor is InteliSecure a law firm, nor is either party making a representation on behalf of a law firm. Nothing in this blog should be construed as legal advice and should not be relied on as such. Introduction to Chinese Data Privacy The European Union’s General…