• GDPR

Privacy by Design — The GDPR, and Inpixon’s Proactive Commitment to Privacy and Security

GDPR

It’s been many months since I first heard about General Data Protection Regulation (GDPR), and to be honest, at first I assumed it was one of those idealized, politician-driven regulations. But, as I dug into the details, and as I have worked closely with the GDPR-specialized legal counsel that we’ve retained to advise us, I’ve come to embrace GDPR — not only its ideals, such as transparency […]

By |2018-12-18T12:48:13-08:00December 18th, 2018|Categories: Privacy, Security|Tags: |

Is the Most Important Room in Your Company Really Secure?

Someone Might Be Listening

Mergers and acquisitions. Updates to rolling three-year business plans. New product releases. Company restructures. SEC filings. These are the types of discussions that take place in corporate boardrooms across America. The information shared during these discussions can be of intense interest to competitors, stock manipulators, disgruntled insiders, and other malicious players who can use that information to do harm. With the list of threats […]

Deter and Delay Is No Longer Enough: How IPA Can Help Focus Response Resources and Improve School Safety

Recent events have pointed out the need for new and enhanced approaches to safety and security in schools. While the truth is that active shooter events are rare, the reality is that every school needs to prepare and take steps to minimize the possibility of and the damage that can result from such an event.

Deter, Delay, Respond

Basic security principles define three major functions of a security program: […]

IPA Security for Corrections: Inpixon at Mock Prison Riot 2018

With the ever-growing problem of mobile phones being used by inmates, all Department of Correction (DoC) facilities around the world are working hard to find a solution. Interdiction and manage access solutions can control phones from a cellular perspective, but Inpixon can easily […]

The Shape of Data Protection: Mobile Device Management Intersects the Security Dome

The explosion in wireless technology and applications, smart portable devices, and the Internet of Things (IoT) has made our lives easier, businesses more productive, and access to data and each other ubiquitous. But, that same explosion brought with it increased opportunities for hacks, malware, data leakage, skimming, shimming, and eavesdropping at levels never seen before, leaving enterprises looking for ways to protect themselves.

On the Road from BYOD […]

Smart Technology Connects Buildings. How Are You Managing It?

With the move to smart cities and buildings, is your company aware of all the technology that can connect to your network?

Companies are becoming more connected with Wi-Fi-enabled devices to enhance the workplace, reduce overhead, and enable communication worldwide. There are no longer only Wi-Fi access points and network extenders; now we have Wi-Fi-powered door locks, light switches, […]

By |2018-05-11T10:05:12-07:00May 9th, 2018|Categories: Big Data, IoT, Security|Tags: , , , , , |

Bluesnarfing: The Modern-Day Security Vulnerability in a Wireless and Mobile World