Blog Authors

Andy KicklighterAndy Kicklighter
Director of Product Marketing
radfordC.J Radford
Vice President of Cloud
charlesCharles Goldberg
Senior Director, Marketing
socialtis2Tina Stewart
Vice President Marketing

DEFENDERS OF DATA

23 Sep
2014
Categories : Data Security            Leave a comment           

You may have missed it unless you are interested in digital certifications and SSL, but the problem of SHA-1 certificate deprecation is something that we’re all going to have to pay some attention to. Here’s what you need to know. The Problem Modern CPUs and computing environments are becoming so powerful that older security protocols are starting to be vulnerable to “brute force” attack methods that allow them to be broken.  This is what is happening with the SHA-1 hash […]

17 Sep
2014
Categories : Cloud Security, Data Breach, Data Encryption, Data Security            Leave a comment           

I’m pretty excited about the CSA Congress and IAPP Privacy Academy in San Jose this week. Although some half-day pre-conference workshops were on the docket for today, for us, the event formally started with the welcome reception earlier this evening. Click to tweet:  What’s the Buzz before #CSACongress #privacyacademy? – See what the speakers had to say @CJRadford! http://bit.ly/1wrqCsz In getting ready for the conference, I spent a few minutes creating the word cloud below from the conference session descriptions […]

16 Sep
2014
Categories : Data Security            Leave a comment           

There’s a common lament we all have, which is that there always seems to be more to do, and less time to do it. The difference for those responsible for complying with the Payment Card Industry Data Security Standard (PCI DSS) is that they now have a lot of evidence to point to. For those individuals, the introduction of the most recent PCI security standard, release 3.0, significantly upped the ante in terms of effort required. While PCI DSS 3.0 […]

09 Sep
2014
Categories : Data Security            Leave a comment           

Target, eBay, Michaels, Neiman Marcus, P.F. Chang’s, Home Depot and SuperValu. According to the Identity Theft Recourse Center Breach Report which presents individual information about data exposure events and running totals for the year, 2014 has seen 521 breaches in total with more than 17 million (17,829,689) records exposed.This number represents more than a 30 percent increase over the same time period last year (400 breaches). Frankly, it’s fair to say that the focus is now when and how will […]

08 Sep
2014
Categories : Big Data, Data Encryption, Database Encryption, Encryption            Leave a comment           

Intel’s AES-NI instructions are extensions to the x86 instruction set to perform AES encryption and decryption directly using Intel CPUs. In addition to being more secure, there are significant performance gains that accrue when using hardware-based encryption. Just as the AES encryption has become a universal and widely adopted standard for symmetric encryption, AES NI-enabled encryption has become the equivalent to a standard for x86-based applications performing hardware encryption starting with Intel’s Westmere processors. Click to Tweet:          ./@Vormetric #DataSecurity for […]

04 Sep
2014
Categories : access control, Cloud Computing, Cloud Security, Data Breach, Data Encryption, Data Security            Leave a comment           

We’ve grown used to hearing about breach incidents on a daily basis, some of which involving the theft of sensitive details and files from cloud environments.  Because cloud computing has transformed the way organisations and individuals approach IT, enabling more agile and cost effective ways of working, the type and volume of data hosted in cloud architectures has increased exponentially making it a target increasingly worthy of unwanted attention from threat actors. From the point of view of protecting this […]

02 Sep
2014
Categories : Data Security            Leave a comment           

Hardly a day goes by that you don’t hear about a major data breach or a new cyberattack that’s making headlines. J.P. Morgan, Community Health Systems and SuperValu have most recently been in the news for massive breaches. Enterprises are spending billions of dollars each year on network and endpoint security defenses, but it seems like the bad guys have the upper hand. According to the Verizon Data Breach Investigations Report, 71% of analyzed data breaches pointed to compromised endpoint […]

28 Aug
2014

As we’re winding down to the end of VMworld today, now is a good time to summarize some of the key data security trends we’re seeing at the event. The first is that data, and the security of data within VMware clouds and environments, is now a hot topic. Not only did VMware announce a set of critical features tied to enhancing data security in today’s environment of “deperimeterization” for networks with the release of NSX 6.1, but the topic […]

26 Aug
2014
Categories : Data Security            Leave a comment           

At VMworld today, VMware announced a new focus on security that includes “deperimeterizing” security and a focus on the desirability of pushing security controls away from the network perimeter. Frankly, I couldn’t agree more.  Study after study over the last few years has shown that perimeters will be penetrated by determined attackers – Verizon’s data breach report, as well as research from Mandiant have showcased both how this gets done, as well as how prevalent it is.  One of our […]

21 Aug
2014
Categories : Data Security            Leave a comment           

The results of SC Magazine’s seventh annual survey, “Guarding against a data breach,” suggests that negative impact to a company’s reputation compels companies to improve their security against a data breach. And yet the unfortunate trend of high-profile breaches continues as the list of retailer and food chains with breached data continue to climb, including: Target, Dominos, Morrisons, Neimen Marcus, P.F. Chang’s, and now Supervalu.In a statement last week, Supervalu disclosed the company’s data breach, and stated that hackers accessed a […]