On June 3, 2017, the FBI arrested the contractor for allegedly removing classified documents from the National Security Agency in Georgia, and then mailing them to a news outlet. She is now the main suspect in the ensuing federal leak …
As self-driving car technology continues to improve, Uber stands to significantly reduce costs and improve margins by utilizing these advancements. The transportation company came onto the scene with such force that its very name became …
The full consequences for this breach have yet to be seen, but the sensitive information in these documents could very well end up in the hands of criminals or foreign spies, all because “former U.S. government hackers and contractors” …
But what about internal users that already have access? What happens when a trusted user becomes a malicious user? This question came up on a recent thread on the OpenText community message board. “The odds are if a user is downloading …
A recent blog post by OpenText, A Duty to Safeguard Client Content, underscores the ethical reasons and regulatory requirements that come into play. Author Sharon Malloch states, “The impact of a breach can be significant. And not just for …
The contractor is suspected of taking the highly classified “source code” developed by the agency to break into computer systems of adversaries like Russia, China, Iran and North Korea. Like Edward Snowden, this contractor was employed by …
The case highlights the need for stronger data security measures in enterprise environments. Galen’s actions could have been prevented with software such as Guardian, which monitors access and prevents excessive or unauthorized …