Blog Authors

kurt hagermanKurt Hagerman
Chief Information Security Officer
Andy KicklighterAndy Kicklighter
Director of Product Marketing
radfordC.J Radford
Vice President of Cloud

DEFENDERS OF DATA

30 Sep
2014
Categories : Data Security            Leave a comment           

If you had to guess at the leading concerns for businesses that operate in the cloud, you’d probably rank security and compliance at the top. Anyone who’s built or managed a cloud knows how complex both can be, from meeting PCI or HIPAA regulations to keeping data out of criminal hands. And as we move further into the age of The Internet of Things and increasing mobility and app-centricity, it’s a safe bet our new security needs will only keep […]

26 Sep
2014
Categories : Cloud Computing, Cloud Security, Data Encryption, Data Security            Leave a comment           

From: Jean-Paul Bergeaux, SwishData Federal use of cloud resources has begun to mature, and with this maturity Federal organizations have started to hone-in on the best uses of private and public cloud resources for them. While private clouds have had strong adoption, with the environment more-or-less completely under the control of the agency, it is only recently that the most compelling use cases for agencies to use public cloud environments have started to become clear. The three most compelling use […]

23 Sep
2014
Categories : Data Security            Leave a comment           

You may have missed it unless you are interested in digital certifications and SSL, but the problem of SHA-1 certificate deprecation is something that we’re all going to have to pay some attention to. Here’s what you need to know. The Problem Modern CPUs and computing environments are becoming so powerful that older security protocols are starting to be vulnerable to “brute force” attack methods that allow them to be broken.  This is what is happening with the SHA-1 hash […]

17 Sep
2014
Categories : Cloud Security, Data Breach, Data Encryption, Data Security            Leave a comment           

I’m pretty excited about the CSA Congress and IAPP Privacy Academy in San Jose this week. Although some half-day pre-conference workshops were on the docket for today, for us, the event formally started with the welcome reception earlier this evening. Click to tweet:  What’s the Buzz before #CSACongress #privacyacademy? – See what the speakers had to say @CJRadford! http://bit.ly/1wrqCsz In getting ready for the conference, I spent a few minutes creating the word cloud below from the conference session descriptions […]

16 Sep
2014
Categories : Data Security            Leave a comment           

There’s a common lament we all have, which is that there always seems to be more to do, and less time to do it. The difference for those responsible for complying with the Payment Card Industry Data Security Standard (PCI DSS) is that they now have a lot of evidence to point to. For those individuals, the introduction of the most recent PCI security standard, release 3.0, significantly upped the ante in terms of effort required. While PCI DSS 3.0 […]

09 Sep
2014
Categories : Data Security            Leave a comment           

Target, eBay, Michaels, Neiman Marcus, P.F. Chang’s, Home Depot and SuperValu. According to the Identity Theft Recourse Center Breach Report which presents individual information about data exposure events and running totals for the year, 2014 has seen 521 breaches in total with more than 17 million (17,829,689) records exposed.This number represents more than a 30 percent increase over the same time period last year (400 breaches). Frankly, it’s fair to say that the focus is now when and how will […]

08 Sep
2014
Categories : Big Data, Data Encryption, Database Encryption, Encryption            Leave a comment           

Intel’s AES-NI instructions are extensions to the x86 instruction set to perform AES encryption and decryption directly using Intel CPUs. In addition to being more secure, there are significant performance gains that accrue when using hardware-based encryption. Just as the AES encryption has become a universal and widely adopted standard for symmetric encryption, AES NI-enabled encryption has become the equivalent to a standard for x86-based applications performing hardware encryption starting with Intel’s Westmere processors. Click to Tweet:          ./@Vormetric #DataSecurity for […]

04 Sep
2014
Categories : access control, Cloud Computing, Cloud Security, Data Breach, Data Encryption, Data Security            Leave a comment           

We’ve grown used to hearing about breach incidents on a daily basis, some of which involving the theft of sensitive details and files from cloud environments.  Because cloud computing has transformed the way organisations and individuals approach IT, enabling more agile and cost effective ways of working, the type and volume of data hosted in cloud architectures has increased exponentially making it a target increasingly worthy of unwanted attention from threat actors. From the point of view of protecting this […]

02 Sep
2014
Categories : Data Security            Leave a comment           

Hardly a day goes by that you don’t hear about a major data breach or a new cyberattack that’s making headlines. J.P. Morgan, Community Health Systems and SuperValu have most recently been in the news for massive breaches. Enterprises are spending billions of dollars each year on network and endpoint security defenses, but it seems like the bad guys have the upper hand. According to the Verizon Data Breach Investigations Report, 71% of analyzed data breaches pointed to compromised endpoint […]

28 Aug
2014

As we’re winding down to the end of VMworld today, now is a good time to summarize some of the key data security trends we’re seeing at the event. The first is that data, and the security of data within VMware clouds and environments, is now a hot topic. Not only did VMware announce a set of critical features tied to enhancing data security in today’s environment of “deperimeterization” for networks with the release of NSX 6.1, but the topic […]