Categories : Data Security            Leave a comment           

Hear ye! Hear ye! The era of the information age has come. Once upon a time, the majority of information and assets were physical. But then the world continued to transition into the digital age, however organizations weren’t set up with the proper precautions to prepare for the information security battle. Nowadays, everyone is fighting for access to IP (Intellectual Property), the secret sauce of essentially all organizations. Aside from protecting customers and employees, organizations must remember that protecting IP […]

Nation-state hacks – 92% of Americans in favor of taking action

Posted By: Andy Kicklighter, @akicklighter (Twitter)
29 Jul
2015
Categories : Data Security            Leave a comment           

As part of an initiative here @Vormetric to better connect IT Security back to people’s ordinary lives, we recently conducted a nationwide poll to ask a question about what people feel needs to be done if a foreign power is found to be behind hacks against the U.S. Government agencies.  It wasn’t a complicated survey, as we were polling people from all walks of life, not just those concerned about technology, or even in our particular patch – IT security. […]

Categories : Data Security            Leave a comment           

Ever since I joined Vormetric in 2012, it’s been full steam ahead. Lately, I’ve been even more optimistic, excited and engaged (yes, it’s possible!) We’re coming up on our 15th year and I work with a group of incredibly smart, passionate and committed people. This means I generally wake up feeling exceptional. Making that reality even better, though, is the fact that our industry is at a turning point and our company momentum is strong. With much going on from […]

Is compliance putting you at risk?

Posted By: Louise Bulman
23 Jul
2015
Categories : Compliance, Data Security            Leave a comment           

Many aspects of our lives involve the creation, storage and exchange of very sensitive digital data that is governed by a variety of detailed compliance mandates.  From a business perspective, compliance is a critical framework without which many sectors – particularly financial services, retail, the public sector, and in fact any company offering services to the general public – would struggle to operate effectively, or indeed at all. ClickToTweet: Could Compliance mandates be damaging your IT Security? http://bit.ly/1DwkIZP  pic.twitter.com/ShDWtOjMom Of […]

21 Jul
2015
Categories : Cyber War, Data Security            Leave a comment            Tags:

So, in the wake of the OMB hack, the federal CIO (Tony Scott) has directed government agencies to get serious about cyber security. The “30-day sprint,” directs agencies to patch all known vulnerabilities; use information provided by Homeland Security to identify and mitigate known threats; limit the number of privileged users and tighten access controls; and “dramatically accelerate” the use of personal identity verification (PIV) cards and other forms of multifactor identification. Yes, in 30 days. ClickToTweet: Will the Cybersecurity […]

16 Jul
2015
Categories : Data Security            Leave a comment           

Earlier this week, Salesforce announced Salesforce Shield, a new set of services available to their customers that includes a strong set of data security features targeted directly at the needs of their enterprise customers.  Include capabilities for auditing, encryption, access controls, event monitoring and data archiving. The most interesting to me are the new capabilities add for protecting data at rest – for customers who either have a specific compliance requirement, or a real need to more deeply protect data […]

Security Service Level Agreements

Posted By: George Mills
13 Jul
2015
Categories : Data Security            Leave a comment           

Service Level Agreements (SLAs) directly involve continuous effort and improvement, significant technical investments and integration; and whether implied or explicit all business have them. Once an organization is consistently meeting their SLAs, the tolerance for change decreases and so goes the saying, “if it ain’t broke, do not fix it”. Now we have a new, often implied Security SLA meaning “though shalt protect my data or you will not keep or earn my business”. Being entrusted to protect one’s own […]

09 Jul
2015
Categories : Data Security            Leave a comment           

About a year and a half ago, many stood stunned as Target’s large infrastructure was infiltrated. Shortly thereafter, major retailers like Michaels, T.J. Maxx, Neiman Marcus and Home Depot were breached and many assumed that it was just a ‘retail problem.’ The current forecast is significantly different. While breach shock value has almost entirely eliminated – individuals are realizing that no industry is immune. Just recently seeing breaches around the IRS, OPM, and most ironically, The Hacking Group, we should […]

(Data at) Rest Assured – CenturyLink and Vormetric Work Together to Secure Data at Rest

Posted By: Steve White, Director, Security and Compliance, CenturyLink Cloud
08 Jul
2015
Categories : Cloud Computing, Cloud Security, Compliance, Data Security            Leave a comment           

As more and more companies move to a cloud model, businesses are giving up physical control of their data repository. If you are the customer and can walk to your server at any point in time, you have a pretty good sense that you are in control of the physical security controls that protect your data. When a company makes the decision to move to the cloud, they are entrusting the cloud provider with the sensitive data that matters most […]

07 Jul
2015
Categories : Compliance, Data Breach            Leave a comment           

The Rules and Regulations Chances are you’ve heard a lot about compliance standards, especially if you are a CSO, CTO or CIO (and if you’re in-house counsel, chances are you have said compliance standards memorized). Lawmakers and regulators around the world are enhancing existing data security compliance requirements, implementing new legal frameworks and defining new data security regulations to respond to increasing internal and external hazards. ClickToTweet: Compliance is Fighting Today’s Battles by Yesterday’s Rules @kessalan #DefenderOfData http://bit.ly/1M8JC6L In a […]