Blog Authors

ashvinkamarajuAshvin Kamaraju
VP of Product Devt & Partner Mgmt
Andy KicklighterAndy Kicklighter
Director of Product Marketing
Robert BigmanRobert Bigman
Guest Author, Former CIA CISO

DEFENDERS OF DATA

30 Oct
2014
Categories : Big Data, Data Breach, Data Protection, Data Security            Leave a comment           

I was recently invited by our South Korea sales team to visit them and present at a Big Data conference in Busan. First off I was glad to see S. Korea embracing or at least tipping their toes in new generation technologies and gladly accepted the invitation.  I want to share my perceptions from the trip and I will start first with economic factors. South Korea is a beautiful, clean country with a strong work ethic and an impressive 3.4% […]

28 Oct
2014
Categories : Data Security            Leave a comment           

Over the past 5+ years we have seen the shift from Data Center walls to a lattice work of the Data Center, Cloud Services, and Contractors.  More and more of our IT services are handled by other parties, and our own organizations are often confused on their role in how to manage and secure the business. <Click to Tweet>: Empowering Organizations for #DataSecurity from@Vormetric’s @scates http://bit.ly/1wARVSa Our collective employees are key contributors, and often the weakest link when it comes […]

22 Oct
2014
Categories : Data Security            Leave a comment           

Earlier today we were honored to have Brigadier General Brad Pray USAF (retired), now with Axios, speaking with Vormetric on a webinar hosted by our partner CaraSoft. The topic was Defending Data in a Perimeter-less Environment. The analogies that he drew about applying the lessons learned in protecting military environments in dangerous circumstances are ones that I think can be used within every organization to help enhance security postures and protect data against the continuous stream of breaches that organizations […]

21 Oct
2014
Categories : Data Security            Leave a comment           

I was listening in on a recent Gartner webinar (the IT Spending Forecast for 2013) when the answer to a question posed to Analyst Bianca Granetto caught my ear. The question was around how to solve security problems given the recent spate of data breaches (I especially like this visual interpretation of data breaches over the last 10 years from Information is Beautiful). Her answer was along the lines of the fact that compliance, regulatory requirements and security must be […]

Next Steps for the Cybersecurity Framework

Posted By: Robert Bigman, Former CIA CISO
16 Oct
2014
Categories : Data Security            Leave a comment           

One of our nations many pressing cyber security issues (that we have still made very little actual progress towards) is strengthening the collective security of our critical infrastructure Information Technology (IT) fabric. Now, I know everyone’s first response will be: “Not true, we now have a cyber security framework; an agreement between the public and private sectors regarding how to measure cyber security risk, how to discern a cyber security program’s level of influence and, most importantly, an articulation of […]

14 Oct
2014

Personal note: When I initially laid out this blog, I planned on stepping through recent revelations in the Dairy Queen breach. However, since my initial outline, Kmart was also breached. These breaches are happening at such a frequent pace, I can’t help but feel the larger story is about security flaws within the retail space. So instead of delivering yet another Dairy Queen article among the masses, I’d instead like to look at security flaws within the retail space as […]

09 Oct
2014
Categories : Data Security            Leave a comment           

It has been an incredible 15 months since the Edward Snowden affair and, yet, his name remains anchored in my many business conversations. It’s not his name, of course, but his actions that has helped coin the phrase ‘Snowden-syndrome’. And, while ‘the insider threat’ is nothing new from a data protection standpoint, the reverberations of his actions have undoubtedly transformed the security landscape as we know it. Given research we released in April of this year confirmed that only 9 […]

06 Oct
2014

Data encryption is increasingly at the forefront of American conversations around cybersecurity. In fact, Fusion’s Daniel Rivero, citing government intrusion and overreach, went so far as to call it “the second amendment battle for the digital age.” Given October is National Cyber Security Awareness Month, it only seems appropriate to explore the benefits of encryption – a strategy that helps keep businesses accountable to their customers, partners, employees and stock holders. Click to Tweet: The Long Game of Encrypt Everything […]

02 Oct
2014
Categories : Data Security            Leave a comment           

As this is the start of Cyber Security Awareness Month, I think it’s appropriate for us to think about the security characteristics of the heart of our organizations – Our people. Over the last several years an increase in data breaches has forced many organizations to take a hard look at their overall security strategy and investments. Part of the challenge is determining where to sprinkle the investments made. For example, traditional anti-virus software while still very important is clearly […]

30 Sep
2014
Categories : Data Security            Leave a comment           

If you had to guess at the leading concerns for businesses that operate in the cloud, you’d probably rank security and compliance at the top. Anyone who’s built or managed a cloud knows how complex both can be, from meeting PCI or HIPAA regulations to keeping data out of criminal hands. And as we move further into the age of The Internet of Things and increasing mobility and app-centricity, it’s a safe bet our new security needs will only keep […]