Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
July 31 - August 5, 2021
Las Vegas, NV, USA
November 4 - October 30, 2021
Toronto, ON, Canada
Black Hat Europe
November 8-11, 2021
Virtual Event
02:00 PM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat Europe 2016:
BooleBox: A New Perspective On Enterprise Data Protection

The thought of sensitive data ending up in the wrong hands can keep both IT administrators and top-managers awake at night. As the latest trends show, many organizations are gaining more and more awareness about the various existing threats to their intellectual property and confidential information.


Many companies, from small and medium businesses to structured multinationals, have already witnessed cybersecurity incidents of unprecedented audacity, such as the Vatileaks scandal dated 2012 or the JP Morgan Bank data breach of 2014, to the most recent attacks against leading global brands such as Yahoo! and Dropbox. Unfortunately, these aren’t scenarios from the latest cyber movie or video game, but the current state of cybersecurity.

These latest attacks exhibit a level of malice that demand a new approach to cybersecurity. For example, the primary sources of attack on data security should no longer be searched only outside the firm. Inside threats, via poor awareness of company policies, lack of attention and use of mobile personal devices represent the wide array of potential existing threats that may compromise company data security from within. And when we talk about data leaks, we’re also referring to many different types of documents that are part of every company’s daily routine: price-sensitive information, intellectual property, patents, confidential information on employees, and much more.

For all these reasons, many companies are now looking for collaboration solutions characterized by embedded strong encryption and deciding to opt for secure collaboration platforms which are able to ensure both flexibility of work and top-level security on data.

In the world of enterprise file sync-and-share options, IT can take many different approaches to secure access on all devices. Vendors small and large offer products for data collaboration, sharing and storage both through cloud and on-premises installations. However, when it comes to enterprise file sync-and-share and security, BooleBox is king.

BooleBox Cloud is actually a military certified file sync and share solution purposely designed for all those individuals and businesses that have sensitive data to protect. Complexity and tediosity have always been the biggest reasons enterprise IT tends to avoid encryption in file-level security systems. BooleBox uses a different approach, which is based on the ability to set and use personal keys to encrypt and unlock files. Unlike other typical public cloud services, the solution offers complete privacy and control over data, including data controls while sharing and securing documents and e-mails. BooleBox basically relies on security standards and devices that have always been adopted within the military frame, making it now possible also for the enterprise world to take advantage and protect itself through its ultimate encryption logics.

For all those companies that need or prefer to store their data “in house,” BooleBox On-Premises is the right solution to be integrated in their IT infrastructure. The solution allows users to safely collaborate on confidential documents and maintain full control on access rights and real time revocability. BooleBox On-Premises also provides advanced security features for organizations needed an added level of protection and security for classified sensitive data.

BooleBox extends enterprise security beyond the perimeter with flexible access controls, granular rights and powerful encryption to wherever and whenever data is being shared. This is why its enterprise products have already gained success all over the world.




Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-09-22
The Telefication WordPress plugin is vulnerable to Open Proxy and Server-Side Request Forgery via the ~/bypass.php file due to a user-supplied URL request value that gets called by a curl requests. This affects versions up to, and including, 1.8.0.
PUBLISHED: 2021-09-22
Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixe...
PUBLISHED: 2021-09-22
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
PUBLISHED: 2021-09-22
In the Amazon AWS WorkSpaces client before 3.1.9 on Windows, argument injection in the workspaces:// URI handler can lead to remote code execution because of the Chromium Embedded Framework (CEF) --gpu-launcher argument.
PUBLISHED: 2021-09-22
Plastic SCM before mishandles the WebAdmin server management interface.