Add to favorites
Want to avoid seeing your corporate data appear in WikiLeaks?
However much you thrive on the roller coaster of business, one adrenaline rush you want to avoid is finding out that your corporate data is on WikiLeaks.
CIOs face the dichotomy of running an agile, flexible, data-sharing organisation while ensuring they are keeping corporate data safe. Much of the data being shared is sensitive in nature and if it gets into the wrong hands the results would be disastrous.
The good news is that it is possible to strike a delicate balance between an agile data model and strong data security.
When it comes to safeguarding data, establishing role-based, data-level security settings and encryption at rest are key to ensuring that data is only shared with appropriate individuals or organisations.
Take, for instance, the activities involved in supporting NHS patients or insurance customers. A doctor or financial analyst should have access to a great deal of patient or customer personal information. On the other hand, a call centre handler booking appointments or renewing policies only needs a restricted view of the same data.
Based on our work with security-conscious organisations, including global banks, here are the key factors that need addressing:
Redaction: Using redaction makes it easy to mask sensitivedata for certain audiences. By removing, replacing or blocking out details such as personallyidentifiable information (PII), it is easy to share custom views of your dataand prevent leakage.This feature has the added bonus of helping with compliance as it provides support for regulations including EU GDPR.
Advanced encryption: To protect data from cyber criminals and insider threats, organisations need to implement encryption in a more systematic way. Advanced encryption involves the selective and transparent encryption of data, configuration and logs. With its automatic and fast granular key rotation, standards-based cryptography and advanced key management, advanced encryption provides separation of duties between the security administrator and any system, network or database administrator to decrease the risk of potential exposure.
Standards Focus: Ensure you use data management products that support standards such as Common Criteria Certification, a stringent standard for computer security. Additionally, look for compartment security, data auditing, strict access controls as well as authentication tools that work with your organisations existing IT infrastructure.
Principle of least privilege: This is the process of deciding which users, programs and processes require access to the information in any particular layer of a computing environment. This includes application security controls around the databases APIs and security capabilities.
RBAC at scale: Role-Based Access Controls that manage individual users access to data dependent on their role have to be deployed at scale or designed with very granular roles and access controls to ensure performance isnt impacted at times when there are high volumes of data being added or queried.
Element level security: While older databases offered security at the document level, the latest technology has made it possible to increase granularity and hide specific elements within a document from users. Security at the element or property level based on an employees role enables companies to protect sensitive information throughout the life cycle of a document.
Certificate-Based Strong Authentication (CBA): CBA ensures the use of an encryption key that is unique to the authentication device and the user. CBA can also be used to digitally sign transactions and provide proof of the integrity and origin of data, also known as non-repudiation.
Effective data governance policies: Its important to implement and follow effective data governance policies and best practices such as maintenance of access controls, metadata, data quality and security features. If your database platform allows attributes to travel with the data, then the policy enforcement can be more granular and effective.
Separation of duties: This security method is used to manage conflicts of interest, the appearance of conflict of interest and fraud. By carefully restricting the types or amount of data any one individual employee can access, it creates a naturalbarrier to fraudulent activity.
Use the strongest available authentication: Using the highest level of authentication ensures the security and quality of the data.Examples include, LDAP, Kerberos and an external Key Management System.
Use SSL/TLS: Last but not least, Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL) is essential to encrypt all communications between all the different nodes and hosts.
We believe enterprises dont need to make a trade-off between data sharing and security. When your most sensitive and valuable data is being integrated across multiple silos of data, it takes a combination of products and processes to ensure that data is secure. But these capabilities can protect against some of the most sophisticated security threats companies are facing todayand in doing so, provide a competitive advantage.
Read more here:
How to keep your data out of WikiLeaks - Computer Business Review
- Wikileaks: Pictures, Videos, Breaking News [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks - Official Site [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks diplomatic cable release shows America's undiplomatic side2432 - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Anonymous WikiLeaks - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Anonymous WikiLeaks - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks, drought and Syria [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Wikileaks - Wikileaks [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- TPP Wikileaks Has Released Another Bombshell 17th JAN 2014 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Terabyte Leaks and Political Legitimacy in the U.S. and China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Secret draft of TPP talks on environment show little enforcement measures [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Noam Chomsky on Wikileaks (2013) - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Assange: Wikileaks - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Wikileaks Reveal Secret US Activity in Afghanistan3963 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Wikileaks UFO/USA and Rant - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- ‘Bad Grandpa,’ ‘The Fifth Estate,’ ‘Cloudy’ sequel, ‘Rush’ [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Sam Worthington's Gallipoli drama for the WikiLeaks era [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Film Review | The Fifth Estate [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Freedom Of The Press Foundation Launches To Support WikiLeaks, Increase Transparency - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- FABIO BORGES EXPLICA QUE O É O WIKILEAKS - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- FABIO BORGES FALA SOBRE O WIKILEAKS - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Douglas Murray and Amy Goodman - Wikileaks, Afghanistan, Arab Spring - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- The Fifth Estate [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cumberbatch Opens TIFF With WikiLeaks Drama974 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Julian Assange opens up on Indian Govt's reaction to WikiLeaks - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Reuter Journalisten Zivilisten werden von US Army ermordet Wikileaks - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- June 4 1989 Wikileaks US Cables - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- WikiLeaks: US trying to 'criminalize journalism' over Snowden leaks - Video [Last Updated On: February 7th, 2014] [Originally Added On: February 7th, 2014]
- Rumbatá Beat Band -- Wikileaks (Jaime Rodríguez) (Live @ Bimhuis - Amsterdam) - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Alex Gibney accepts the 2014 Paul Selvin Award for We Steal Secrets: The Story of WikiLeaks - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Security Graph 3D Visualization: WikiLeaks.org - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Russian UFO encounter wikileaks 2014 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- WikiLeaks [Last Updated On: February 16th, 2014] [Originally Added On: February 16th, 2014]
- WIKILEAKS UFO FOOTAGE THAT WAS BANNED. - Video [Last Updated On: February 17th, 2014] [Originally Added On: February 17th, 2014]
- Snowden files show how governments monitor Wikileaks and supporters [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Snowden files show governments monitor Wikileaks and others [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- WikiLeaks now has own search engine [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Spies monitored WikiLeaks visitors in real time, Snowden docs show [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Wikileaks - Soldati americani uccidono innocenti - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Visited WikiLeaks? NSA and GCHQ know about it [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Julian Assange, Wikileaks and Site Visitors Targeted By NSA - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Wikileaks on Lencho Leta (TOP Secret) - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- The Dalai Lama Treasure Chest: New Evidence from Wikileaks - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- BBC WikiLeaks The Secret Life of a Superpower Ep 1 - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- NSA Targeted WikiLeaks, Pressured Foreign Countries to Arrest Julian Assange for Publishing [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- Documents Reveal NSA and GCHQ Efforts to Destroy Assange And Track Wikileaks Supporters - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Glenn Greenwald On Surveillance Of Wikileaks - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- We Steal Secrets, la vérité sur Wikileaks - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- WikiLeaks spied on by the NSA and GCHQ - Truthloader - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Tech News Today 946: WikiLeaks Visitors Tracked - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- 'Paranoid, vain and jealous' - the secret life of WikiLeaks founder Julian Assange [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Wikileaks BBC Scandal, how I faked the winner of Chris Evans 500 Words Short Story Contest 2014 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Julian Assange posed 'no real security threat' to Australia [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- Wikileaks Exposes 9 11 Conspirators - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- [002] Nuclear Plant Whistleblower Fired / Banker Suicides / WikiLeaks Surveillance - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- WikiLeaks Spied On By The NSA And GCHQ - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- wikileaks Drone footage 2013 - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Wikileaks Reveals Saddam And Bush Negotiated Before Kuwait Invasion - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- More Snowden Leaks How The Government Reacted To Wikileaks - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Amazing Wikileaks Video Of Roswell Grey Alien Unbelievable! - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- More Snowden Leaks: How The Government Reacted To Wikileaks - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- 42 David Duke Wikileaks exposes Zionist Treachery - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Wikileaks Nibiru Planet X new evidence 2014 - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- WikiLeaks' Julian Assange Has Cost The Met Police £5.3m During Ecuador Embassy Stay [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- تطوانيون بإفران و النواحي - Video [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- 'This Week' Transcript: WikiLeaks' Julian Assange [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- WikiLeaks UFO Video Analyzed avi - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- WikiLeaks Cables Foreshadow Russian Instigation of Ukrainian Military Action [Last Updated On: March 2nd, 2014] [Originally Added On: March 2nd, 2014]
- Assange Held Back Wikileaks About U S , Israel - Video [Last Updated On: March 2nd, 2014] [Originally Added On: March 2nd, 2014]
- WikiLeaks Cables Reveal Ukraine's Past Cries For Help; Is Kerry's $1 Billion In Aid Too Late? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Flashback: WikiLeaks Cables Show Ukraine Worried About Russian Incursion in 2006 [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Wikileaks. Film dokumentalny - Video [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Assange: Is Obama wearing pants? [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- SXSW: Julian Assange Says Living in Ecuadorian Embassy Is 'Like Prison' [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks founder has harsh words for Google, Facebook [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- 'WikiLeaks' Assange hints at more leaks [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks' Julian Assange talks NSA, hints at more leaks [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks' Julian Assange: NSA critics got lucky because agency had no PR strategy [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Wikileaks' Assange says group will release new secret data [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Afghan journalist Enayat Najafizada on the burden of releasing WikiLeaks documents - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- The Dalai Lama files from Wikileaks - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]