But what about internal users that already have access? What happens when a trusted user becomes a malicious user? This question came up on a recent thread on the OpenText community message board. “The odds are if a user is downloading …
A recent blog post by OpenText, A Duty to Safeguard Client Content, underscores the ethical reasons and regulatory requirements that come into play. Author Sharon Malloch states, “The impact of a breach can be significant. And not just for …
The contractor is suspected of taking the highly classified “source code” developed by the agency to break into computer systems of adversaries like Russia, China, Iran and North Korea. Like Edward Snowden, this contractor was employed by …
The case highlights the need for stronger data security measures in enterprise environments. Galen’s actions could have been prevented with software such as Guardian, which monitors access and prevents excessive or unauthorized …
