Data Security Challenges for the Global A&D Supply Chain

By E.K. Koh, VP of Solutions, NextLabs, Inc. An interview with Luis F. Dannenfels, Senior Principal Architect, Raytheon NextLabs recently sat down with Luis F. Dannenfels, Senior Principal Architect at Raytheon, to discuss the challenges that A&D companies face in the age of globalization and access anywhere, from any device. Luis talks about the challenges … More Data Security Challenges for the Global A&D Supply Chain

4 Ways IT must Change to Protect your Business

By E.K. Koh, VP of Solutions at NextLabs It’s not your perimeter. It’s not your applications. In an age where there is no perimeter, where data moves from application to application, from servers to desktops to tablets and smart phones that the company does not even own, managing security at the perimeter or application is … More 4 Ways IT must Change to Protect your Business

What are the Financial Costs of Data Loss?

By E.K. Koh, VP of Solutions at NextLabs |   The direct financial costs include future loss of revenue when trade secrets are stolen today. According to the Battelle Foundation report “2013 Global R&D Funding Forecast”, the financial costs of intellectual property theft – internal and external – are compounded over time. When trade secrets are stolen, … More What are the Financial Costs of Data Loss?

Protecting Against Data Breach – what offers the best bang for your buck?

By E.K. Koh, VP of Solutions at NextLabs   There has been a lot of talk about how data breach is exponentially increasing. In a recent NIST cyber security framework, there is an entire segment on “Protecting” Data. To be effective against cyber-breach, we all agree that implementing all elements of the NIST framework is … More Protecting Against Data Breach – what offers the best bang for your buck?

Can we turn off Snowden’s access after the fact?

By E.K. Koh In my last blog, Would data-level controls have stopped Snowden, I highlighted the importance to separate system rights from data rights. But what if Snowden was using a login credential that in fact grants him rights to sensitive data? Accounts vary, but in the blog What the Snowden affair taught us , … More Can we turn off Snowden’s access after the fact?