3 Ways to Lock CAD files and Protect Companies Drawings

3 Ways to Lock CAD files and Protect Companies Drawings

AutoCAD files contains sensitive information that should be locked to some recipients or protected from editing. Often, companies need to share some CAD drawings with a team of professionals who work collaboratively to improve the designs, framework, or content. But...
How to calculate the cost of a data breach – A Case Study

How to calculate the cost of a data breach – A Case Study

Every day there are news related to companies and public organizations that have suffered a data breach due to an external attack, human error, or negligent actions on the part of employees or former employees. We see that around these news there is data that the...
PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

Many companies store their corporate documentation and collaborate daily through Box. Users access and share files easily, but in many cases the documents shared with third parties contain confidential information, losing absolute control of the information and the...
Data Processing Agreement, International Transfers and Regulations

Data Processing Agreement, International Transfers and Regulations

In this article we will discuss the implications of the Personal Data Processsing Agreement (DPA) required by the Regulation. This have recently become particularly relevant, more specifically, about data transfers to countries outside the European Union where the...
Predictions in the field of Data-Centric Security for 2022

Predictions in the field of Data-Centric Security for 2022

In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...
Secure Data Collaboration and Control of Information in Use

Secure Data Collaboration and Control of Information in Use

Secure data collaboration brings great value to companies, through the exchange of data between business partners we can help grow the business, but it also involves exposing the company to a great risk such as data leakage and lose of control. In this article we...
File Integrity Monitoring through a Data-Centric Security Approach

File Integrity Monitoring through a Data-Centric Security Approach

In this article, we are going to focus on the concept of information integrity, and more specifically, we will discuss the technologies around what is known as File Integrity Monitoring (FIM) and how a data-centric approach to protection can help us maintain it. Table...