What is BYOD in Cyber Security: Safeguarding Against Data Breaches via Smartphone
Discover the evolving landscape of Bring Your Own Device (BYOD) policies and the risks posed by smartphone photo-based breaches.
G-71 Launches Integration with Mail Servers to Secure Email Attachments
G-71 launched an extensive integration of its LeaksID solution with all major mail servers to ensure the utmost security of sensitive email attachments.
Help Net Security
G-71 Launches Integration With Mail Servers to Secure Email Attachments
G-71 is thrilled to announce the launch of an extensive integration of LeaksID with all major mail servers to ensure the security of sensitive email attachments.
What Function Do Insider Threat Programs Serve?
The article provides comprehensive information about insider threat programs, covering eight crucial points for their successful implementation.
Protecting Confidential Documents: The Power of Hidden Anti-Leak Marks
This article examines three vital aspects of document confidentiality: Access Control, Monitoring, and Detection, with a focus on steganography.
Building Trust in Sensitive Document Handling: Interviewing Startups of the Year Nominee, G-71 Inc.
Read the new interview with Sergey Voynov, the CEO of G-71, as part of “Startups of the Year 2023” by Hackernoon.
HackerNoon
A Comparison of Visible Watermarks and LeaksID Anti-Leak Labels
This article compares visible watermarks with LeaksID’s anti-leak labels (fingerprints) and emphasizes the advantages of LeaksID’s undetectable labeling.
10 Unusual Insider Threat Behavioral Indicators
The article highlights the unusual data behaviors that may indicate an insider threat and suggests solutions to detect suspicious activities in organizations.
G-71 Inc. Announces Updates to LeaksID Investigation Module, Reducing Time Required to Determine Source of Confidential Document Leaks
G-71 Inc., a provider of a document security solution, announced the update of their LeaksID investigation module, which significantly reduces the time required to identify the source of a confidential document leak.
G-71 Inc. Announces Updates to LeaksID Investigation Module, Reducing Time Required to Determine Source of Confidential Document Leaks
G-71 Inc., a provider of a document security solution, announced the update of their LeaksID investigation module, which significantly reduces the time required to identify the source of a confidential document leak.
Digital Journal