Blog Authors

radfordC.J Radford
Vice President of Cloud
Andy KicklighterAndy Kicklighter
Director of Product Marketing
socialtis2Tina Stewart
Vice President Marketing
Paul AyersPaul Ayers
VP EMEA

DEFENDERS OF DATA

28 Aug
2014

As we’re winding down to the end of VMworld today, now is a good time to summarize some of the key data security trends we’re seeing at the event. The first is that data, and the security of data within VMware clouds and environments, is now a hot topic. Not only did VMware announce a set of critical features tied to enhancing data security in today’s environment of “deperimeterization” for networks with the release of NSX 6.1, but the topic […]

26 Aug
2014
Categories : Data Security            Leave a comment           

At VMworld today, VMware announced a new focus on security that includes “deperimeterizing” security and a focus on the desirability of pushing security controls away from the network perimeter. Frankly, I couldn’t agree more.  Study after study over the last few years has shown that perimeters will be penetrated by determined attackers – Verizon’s data breach report, as well as research from Mandiant have showcased both how this gets done, as well as how prevalent it is.  One of our […]

21 Aug
2014
Categories : Data Security            Leave a comment           

The results of SC Magazine’s seventh annual survey, “Guarding against a data breach,” suggests that negative impact to a company’s reputation compels companies to improve their security against a data breach. And yet the unfortunate trend of high-profile breaches continues as the list of retailer and food chains with breached data continue to climb, including: Target, Dominos, Morrisons, Neimen Marcus, P.F. Chang’s, and now Supervalu.In a statement last week, Supervalu disclosed the company’s data breach, and stated that hackers accessed a […]

19 Aug
2014
Categories : Big Data, Data Breach Disclosure, security intelligence            Leave a comment           

Earlier this year the GAO reported that the number of security incidents for Federal Agencies involving Personally Identifiable Information (PII) increased 2.5x between 2009 and 2013. This year, with the rising tide of highly visible data breaches in retail, health care and other areas I’m expecting the picture to further deteriorate. Why is it this is the case?  Three key reasons appear: Lack of real penalties Inertia in IT Security investments Standards that drive only minimum behavior When a data […]

14 Aug
2014
Categories : Data Security            Leave a comment           

Black Hat 2014 was a great conference, and left me with some lasting impressions. The crowd- First and foremost, the crowd was a much different mix from RSA and other industry events.  Attendees were a very focused demographic – the people who have to actually do the work of protecting their organizations and implementing IT Security.  Looking at a traditional organization chart, you’d say that they were mostly mid-level security types and very technical.  But as the result of their […]

13 Aug
2014
Categories : Data Security            Leave a comment           

Meet Dawn Marie Hutchinson. Dawn was hired last year as the head of information security to keep Urban Outfitters void of future attacks. Dawn believes that Urban Outfitters should not have to disclose when a breach occurs.1 Dawn is not alone. She is among a group of executives taking a stand in a debate on the merits of disclosing attacks. With a belief system that breaches don’t always lead to harm, the organization is fighting for breaches to be handled […]

07 Aug
2014
Categories : Data Security            Leave a comment           

In the space of two short weeks, eBay’s ticket selling site StubHub and online bookmakers Paddy Power joined the already long list of 2014 data breaches. And, as always, important lessons can be drawn from these two events. In the first instance, and typical to almost every breach, what unites both is that personally identifiable information was stolen – including individual customer names, usernames, addresses, email addresses, phone contact numbers and dates of birth. But, what distinguishes the StubHub breach […]

06 Aug
2014
Categories : Data Security            Leave a comment           

Reading an article last weekend about everybody’s favourite hero and villain du jour, Edward Snowden, I was particularly struck by one comment: ” What last year’s revelations showed us,” said Snowden, ” was irrefutable evidence that unencrypted communications are no longer safe.” It’s a bold statement but one, I suspect, that will not surprise many.  Even before the Snowden revelations, it was commonplace for organisations to disclaim in their privacy policies that “no communication over the Internet can ever be […]

05 Aug
2014
Categories : Data Security            Leave a comment           

Back in April 2013, we investigated the motivations behind IT security spending. Our global online survey, targeted at IT professionals, found that newer IT trends – such as big data, cloud, BYOD and mobile security practices – were major security spending drivers. The survey gathered responses across a full range of markets – banking/financial services, retail, manufacturing, public sector and others. At the time, about 16 percent of respondents selected ‘data breaches’ as the primary data security driver at their […]

29 Jul
2014
Categories : Data Security            Leave a comment           

Big data analytics are proving a boon to business and government, enabling organizations to analyze whole sets of related data or data from disparate sets, for patterns and trends in ways never before possible.  Use cases are growing quickly, and we are only at the beginning of understanding how best to make use of this technology. Retail – Create a full profile of not only what people are buying, but the process they go through to make their selections.  Data […]