5 New Rules for Keeping Your Company Safe

New White Paper from SpiderOak Explains Foundational Shift in Thinking Required in 2018 Landscape NEWS PROVIDED BY SpiderOak  CHICAGO, Jan 30, 2018 /PRNewswire — As CEOs, executive teams, and boards of directors seek to contain their companies’ cybersecurity risk, technology security firm SpiderOak warns that there are key differences in the cybercrime landscape now…

Continue Reading

A sync technology with no backdoors?

A Secure, Compartmentalized File Sync Tool The SpiderOak Sync tool offers easy and fast file sharing and sync with guarantees of integrity, authority, and confidentiality through our use of private blockchain technology. While the mobile file sync and collaboration are similar to other public cloud solutions, SpiderOak offers a fundamentally…

Continue Reading

SpiderOak and Policy Management

May 5, 2019 Technology Issues The policies of agencies can be enforced by new technology. Data and controls can be protected with private blockchain. Example: A written policy of an organizations policy says “don’t steal data”. No way to enforce the policy with current technology. Gaps are managed by rules…

Continue Reading

SpiderOak Policy Engine

Using distributed ledger and a unique rules engine we can enable ‘need to know’ security with no gap between policy and technology enforcement. We recognize that some organizations have well developed ‘need to know’ policies when it comes to sensitive data, especially when dealing with national security, defense or law…

Continue Reading

Spideroak’s unique approach to closing the vulnerability gap

Using distributed ledger and a unique rules engine we can enable ‘need to know’ security with no gap between policy and the actual technology enforcement. We recognize that all organizations have well developed ‘need to know’ policies when it comes to extremely sensitive data, especially when dealing with national security…

Continue Reading

How to stop attackers with SpiderOak’s Authority Model

SpiderOak’s Authority Engine is a flexible technology that can be plugged into any environment where organizations need certainty over how data can be accessed. Software & hardware defects, malware and compromised networks all lead to attackers gaining authority they shouldn’t have. System and network administrators are given authority they don’t…

Continue Reading

Enabling Organizational Policies to Drive Security

When policy can be executed by technology — few examples exist. SpiderOak technology allows organizations to match policy to technology. Public keys are the basis for identity. Distributed ledgers are the best way to define and maintain roles and permissions. Once an actor has public keys and a clear set…

Continue Reading

A security model based on a Distributed approach

A security model based on a Distributed approach, by its very nature, enforces better data security while also reducing the risk of security breaches and compromised data. The traditional, Centralized approach allows IT services and staff to manage all aspects of the access to your data when all they are…

Continue Reading

Authority Based Security with SpiderOak

Authority — Who can do what with the data in question. Identity — To be able to understand authority, you then need to have a grasp on identity. You can’t apply rules on authority if you don’t know to whom they’re being applied. Confidentiality — The primary use of authority…

Continue Reading

Three Simple ideas — Distributed Ledgers

1.Distributed ledgers are the best way for Organizations to define and maintain roles and permissions, a.k.a. Authority. 2.Public keys are the best basis for Identity. 3.Public keys paired with a clear set of roles & permissions enable instant provisioning of secure, cryptographically enforced compartments for data storage and communications. SpiderOak…

Continue Reading