Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
02:00 PM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat Europe 2016:
BooleBox: A New Perspective On Enterprise Data Protection

The thought of sensitive data ending up in the wrong hands can keep both IT administrators and top-managers awake at night. As the latest trends show, many organizations are gaining more and more awareness about the various existing threats to their intellectual property and confidential information.


Many companies, from small and medium businesses to structured multinationals, have already witnessed cybersecurity incidents of unprecedented audacity, such as the Vatileaks scandal dated 2012 or the JP Morgan Bank data breach of 2014, to the most recent attacks against leading global brands such as Yahoo! and Dropbox. Unfortunately, these aren’t scenarios from the latest cyber movie or video game, but the current state of cybersecurity.

These latest attacks exhibit a level of malice that demand a new approach to cybersecurity. For example, the primary sources of attack on data security should no longer be searched only outside the firm. Inside threats, via poor awareness of company policies, lack of attention and use of mobile personal devices represent the wide array of potential existing threats that may compromise company data security from within. And when we talk about data leaks, we’re also referring to many different types of documents that are part of every company’s daily routine: price-sensitive information, intellectual property, patents, confidential information on employees, and much more.

For all these reasons, many companies are now looking for collaboration solutions characterized by embedded strong encryption and deciding to opt for secure collaboration platforms which are able to ensure both flexibility of work and top-level security on data.

In the world of enterprise file sync-and-share options, IT can take many different approaches to secure access on all devices. Vendors small and large offer products for data collaboration, sharing and storage both through cloud and on-premises installations. However, when it comes to enterprise file sync-and-share and security, BooleBox is king.

BooleBox Cloud is actually a military certified file sync and share solution purposely designed for all those individuals and businesses that have sensitive data to protect. Complexity and tediosity have always been the biggest reasons enterprise IT tends to avoid encryption in file-level security systems. BooleBox uses a different approach, which is based on the ability to set and use personal keys to encrypt and unlock files. Unlike other typical public cloud services, the solution offers complete privacy and control over data, including data controls while sharing and securing documents and e-mails. BooleBox basically relies on security standards and devices that have always been adopted within the military frame, making it now possible also for the enterprise world to take advantage and protect itself through its ultimate encryption logics.

For all those companies that need or prefer to store their data “in house,” BooleBox On-Premises is the right solution to be integrated in their IT infrastructure. The solution allows users to safely collaborate on confidential documents and maintain full control on access rights and real time revocability. BooleBox On-Premises also provides advanced security features for organizations needed an added level of protection and security for classified sensitive data.

BooleBox extends enterprise security beyond the perimeter with flexible access controls, granular rights and powerful encryption to wherever and whenever data is being shared. This is why its enterprise products have already gained success all over the world.



Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.