01 Sep
2015
Categories : Data Security, Encryption            Leave a comment           

If you’re running a business, there’s a good chance you’re focused on reaching certain end goals. Two of those goals likely include both velocity and profitability. The Oxford Dictionary defines velocity as “the speed of something in a given direction” and profitability as “the degree to which a business or activity yields profit or financial gain.” Generally, the former – in some capacity, regardless of the industry – is necessary to achieve the latter. I bring this up not to […]

31 Aug
2015
Categories : Data Security            Leave a comment           

It’s been said that those who don’t learn from history are doomed to repeat it. In my last article, I wrote metaphorically about the medieval arms race to protect the pot of gold inside the castle from outside intruders. This time I want to draw upon history as the telescopic lens through which we forecast the journey into the future in a world full of advanced technology. Through this lens, we will see that the future is already here and […]

The Key to Canadian Cybersecurity and Culture

Posted By: Henry Anzarouth, @hanzar (Twitter)
28 Aug
2015
Categories : Data Security            Leave a comment           

Today, I wanted to discuss key trends in Canada’s cybersecurity efforts. As a neighbor to the U.S., Canadian enterprises have observed the exponential growth of data threats occurring within U.S. borders. This begs the question: are Canadian organizations keeping pace? According to our recent Insider Threat Report, 54 percent of global organizations host sensitive data in the cloud. The need and importance to protect data is echoed globally, however the manner in which data is protected differs from country to […]

Feeling SaaS-y with Vormetric for SaaS Providers

Posted By: derektumulak, @tumulak
27 Aug
2015
Categories : Data Security            Leave a comment           

In case you missed the memo, let me be the first to officially welcome you to the new world order of software as a service, or SaaS. Whether work or play, SaaS has enabled our on-demand, pay-as-you-go lifestyle. From consumer brands (such as Netflix) to enterprise SaaS providers (like Salesforce), SaaS offerings have played a large role in meeting the changing software needs of users today. The shift towards SaaS subscriptions has enabled customers to avoid infrastructure costs and focus […]

26 Aug
2015
Categories : Data Security            Leave a comment           

I’m not proud to admit it, but it’s true, reports of major data breaches make me happy (Unless of course the breach happens to affect me personally, and I have to deal with things like updating my online payment information for dozens of vendors because a new credit card number has been issued.) Like a lot of other folks in the IT security industry, a part of this joy is enlightened self-interest—breaches can be good for business. Beyond that, though, […]

25 Aug
2015
Categories : Data Security            Leave a comment           

We’ve seen movie after movie where criminals pack into a van with ski masks and ram into a bank with weapons. Once they get their hand on the money, the robbers race off with a bit more cash in their pocket. While old school theft is still an issue, nowadays we have the added pressure of maintaining security in the cyber world. A world where ramifications can be significantly larger than the latest bank heist. ClickToTweet: The New World Order: […]

Data is the New Gold; Getting Data Security Right in Retail

Posted By: Chris Olive, @ITSecConsultant (Twitter)
20 Aug
2015
Categories : Data Security            Leave a comment           

Traditional security has always been metaphorically tied to the medieval castle building of old: building thicker walls and drawbridges, creating multiple perimeters, raising larger armies, you know – the whole nine yards. This paradigm extends into the modern world, which maintains its fascination with sophisticated perimeters. For exhibit A, witness the recent Mission: Impossible Rogue Nation Hollywood blockbuster where sophisticated perimeter security was the primary obstacle to overcome. But imagine changing that mindset from traditional perimeter-based security to data-centric. A […]

Getting Data Security Right: Government

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
20 Aug
2015
Categories : Data Security            Leave a comment           

Last month was a big month for federal cybersecurity initiatives. With the announcement of the cybersecurity sprint results, many questions were posed by security professionals and businesses alike. The results announced on July 31 were positive and include: Federal Civilian agencies increased their use of strong authentication for privileged and unprivileged users from 42 percent to 72 percent – an increase of 30 percent since agencies last reported their quarterly data on Performance.gov. Specifically, Federal civilian agencies increased their use […]

DefCon’s Message: Are you ready to be hacked?

Posted By: Brent Hansen, @brentahansen
14 Aug
2015
Categories : Data Security            Leave a comment           

Attending the combination of BlackHat and DefCon was once again an eye-opening experience. While speaking with people in our booth, I continued to look around in awe at all of the vendors there. I began to wonder if a customer had unlimited funds and they bought every vendor technology there at BlackHat and created this data security stack, what would that look like? Who would be the strongest in the stack? Would there still be possible security gaps? Outside of […]