What are the Financial Costs of Data Loss?

By E.K. Koh, VP of Solutions at NextLabs |   The direct financial costs include future loss of revenue when trade secrets are stolen today. According to the Battelle Foundation report “2013 Global R&D Funding Forecast”, the financial costs of intellectual property theft – internal and external – are compounded over time. When trade secrets are stolen, … More What are the Financial Costs of Data Loss?

Protecting Against Data Breach – what offers the best bang for your buck?

By E.K. Koh, VP of Solutions at NextLabs   There has been a lot of talk about how data breach is exponentially increasing. In a recent NIST cyber security framework, there is an entire segment on “Protecting” Data. To be effective against cyber-breach, we all agree that implementing all elements of the NIST framework is … More Protecting Against Data Breach – what offers the best bang for your buck?

Cloud Security – Protecting data at rest and in transit – Information Risk Management for the Cloud

By Sudhindra Kumar, Principal Software Engineer at NextLabs In my previous blog, we discussed about Data Governance Policies and Regulatory Compliance. In this post, we’ll see some of the options available to protect data at rest and in transit. A few years ago, protecting data in transit was considered more important than protecting data at rest. … More Cloud Security – Protecting data at rest and in transit – Information Risk Management for the Cloud

Can we turn off Snowden’s access after the fact?

By E.K. Koh In my last blog, Would data-level controls have stopped Snowden, I highlighted the importance to separate system rights from data rights. But what if Snowden was using a login credential that in fact grants him rights to sensitive data? Accounts vary, but in the blog What the Snowden affair taught us , … More Can we turn off Snowden’s access after the fact?

Challenges to Secure Product Collaboration in PLM Applications

By Sandeep Chopra — Design and engineering organizations consistently describe controlling sensitive product data as a top IT priority. However, trends in product collaboration technologies are creating new risks to securing product data. As PLM applications evolve into more complex ecosystems, design engineering teams are empowered to collaborate in new ways. But as collaboration becomes more … More Challenges to Secure Product Collaboration in PLM Applications