Posts by Ryan St. Hilaire :

Ryan St Hilaire was the VP of product management at Absolute, with more than 11 years of product management experience and 15 years of technology experience. St Hilaire has a Bachelor of Science, majoring in computer science, from the University of British Columbia in Vancouver, Canada.
Effective Endpoint Security Key to Data Security
Effective Endpoint Security Key to Data Security

If you look around any organization, it is clear that the number of endpoints and applications in use is growing exponentially. Data is being accessed from local and cloud-based storage through mobile devices that can be used as an access point to your most sensitive information.

READ MORE
Best Practices Not Cutting It for Data Security
Best Practices Not Cutting It for Data Security

Organizations that follow data security “best practices” may think they are prepared to prevent data breaches, but in 2014 we saw over 1 billion records compromised by some of the largest - and presumably best prepared - organizations. It only takes one single device or point of entry to potentially expose millions of records. Data breaches are happening at an accelerated pace and only those organizations who adopt a...

READ MORE
Going on the Offensive to Combat Internal Threats in the Mobile World
Going on the Offensive to Combat Internal Threats in the Mobile World

Insider threats are not new; 37% of organizations experienced cybercrime involving an insider in 2014. Among all incidents, insiders posed the biggest threat to the intentional theft or exposure of confidential records (76%) and consumer records (71%). Although some of these issues are associated with deliberate acts, it’s usually unintentional behaviour or negligence - disabling encryption, losing a device - that pose the greatest risk.

READ MORE
Data Security Risk Mitigation in Financial Services
Data Security Risk Mitigation in Financial Services

With the rapidly increasing interconnectivity of information, more endpoints than ever before are accessing the corporate network and the sensitive financial information therein. At the consumer perspective, the primary point of interaction has shifted from in-person to in-hand, as tablets and smartphones become the primary way financial services are conducted. While there have been incredible benefits from this technology transformation, sensitive data now resides beyond the bounds of traditional...

READ MORE
Defending Corporate Data in Spite of Employees
Defending Corporate Data in Spite of Employees

Almost 95% of IT security breaches can be attributed to some kind of human error. They say “to err is human,” and this definitely holds true for IT security. Thankfully, there are steps organizations can take to defend corporate data from employee mistakes. I recently wrote an article on Defending Corporate Data in Spite of Employees for Computer Technology Review, an article which explores just how and why employees...

READ MORE