article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

However, there’s a third pillar of zero trust that hasn’t gotten quite as much attention: directly defending data itself, whether it be at the coding level or in business files circulating in a highly interconnected digital ecosystem. Votiro has established itself as a leading supplier of advanced technology to cleanse weaponized files.

article thumbnail

Hunton & Williams and Acxiom to Facilitate Response to UK Government’s Call for Evidence on Current Data Protection Legislation

Hunton Privacy

Responses must be submitted by October 6, 2010. “It I believe we have everything to gain from a sensible, proportionate and rights-based data protection framework, and one that works for you as businesses, service-providers and citizens,” said Minister of State for Justice, Lord McNally.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ten Years After: RIM Standards Evolve Slowly

Positively RIM

While still a business service, today’s records leaders carry consultative and strategic responsibilities as well. In 2010, records programs need to meet internationally-accepted standards more than ever. In a decade, the discipline of records management “rose from the basement to boardroom”, to quote ARMA workshops.

article thumbnail

KMIP: The Cure for the Common Key Management Headache

Thales Cloud Protection & Licensing

came out in 2010. In addition, the DSM is starting to support a number of new business services as well. Over the past decade, substantial resources have been invested in optimizing the KMIP standard, helping enhance implementations and expand capabilities. The first release of KMIP, version 1.0, Release 1.4 Plans for 2.0