Encrypted We Stand, Hacked We Fall

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
01 Jul
2015
Categories : Data Security            Leave a comment           

The U.S. as a country has a long-standing history of fighting for freedom from powerful authorities. Now, we are in a new fight: one that affects us not in a traditional manor such as a physical invasion, but one that is virtual. In light of this, we’re celebrating Independence Day in cyber fashion by sharing our thoughts on achieving cyber freedom. ClickToTweet: Encrypted We Stand,  Hacked We Fall – @Wayne42675 #DefenderOfData http://bit.ly/1Ca47jF As the flurry of breaches continues, the recent […]

The OPM Breach and Cybersecurity Sprint– How far will they get?

Posted By: Andy Kicklighter, @akicklighter (Twitter)
29 Jun
2015
Categories : Data Security            Leave a comment           

With the end of the 30 day Cybersecurity Sprint that U.S. CIO Tony Scott announced on June 12th rapidly approaching, I thought it would be a good time to look both the 30 day goals as well as the goals of the Cybersecurity Sprint team that will report out at the end of the sprint. ClickToTweet: What will result from the Cybersecurity Sprint? http://bit.ly/1Jlabp0 Four focus areas that must be reported on to the Department of Homeland Security (DHS) and […]

Five Reasons to Secure Your NoSQL Deployments

Posted By: Don Pinto - Couchbase, @NoSQLDon
25 Jun
2015
Categories : access control, Application Encryption, Big Data, Encryption, Encryption Key Management            Leave a comment           

Recently, NoSQL databases have become very popular across enterprises and many of them are choosing Couchbase to power their web, mobile, and IoT applications. As more and more companies adopt NoSQL, the amount of sensitive data stored in these repositories is also rising. Typically, it is a standard practice for enterprises to put the database behind a firewall, and implement extensive security controls. But these technologies alone cannot protect an organization from data breaches and data leakage. ClickToTweet: 5 Reasons […]

Locking Down Data – Full Disk Encryption vs. File Encryption

Posted By: Andy Kicklighter, @akicklighter (Twitter)
23 Jun
2015
Categories : Data Security            Leave a comment           

Warning, Warning, Caution – your system will become exposed in 10, 9, 8, 7… okay perhaps a tad dramatic. But before we compare full disk encryption and file level encryption let’s start with a quick story. Once upon a time, vaults were not as effective as they are today because banks could not control how and when they could be opened. Anyone with the combination or key could open them at any time. Today, vaults can require multiple combinations, specific […]

18 Jun
2015
Categories : Data Security            Leave a comment           

The threat to businesses from insider threats changes daily. As new IT initiatives are deployed across the organisation, and new users are given access to corporate resources, there is always a risk that they will end up being exploited in some way. Our latest research into this particular threat tells us that European organisations are finding it almost as difficult to deal with now as they were 12 months ago. ClickToTweet: The New Nature of Insider Threats – Europe @solcates […]

A look inside the 2015 European Insider Threat Report

Posted By: Tina Stewart, @socialTIS
17 Jun
2015
Categories : Insider Threat            Leave a comment           

Today marks the release of our latest insider threat report in Europe, investigating how IT Decision Makers in the region are evaluating and addressing the risks posed by this specific threat vector. This is the third time we have conducted European research into this area (following research released in March 2014 and in April 2013), with the latest findings suggesting that organizations are still struggling to protect their data. One of the primary reasons that organizations feel vulnerable is because […]

Categories : Data Security            Leave a comment           

Big Data. We hear about it all the time, but over the last few years, the phrase itself seems to be losing value. How do we rebuild the value that Big Data once had? Additionally, how do we ensure that the data in Big Data is secure? Managing Big Data requires critical data protection. According to Vormetric’s recent Insider Threat Report, more than 80 percent of organizations use cloud and Big Data services. With 54 percent claiming to keep company-sensitive […]

Vaults, Locks & Encryption

Posted By: George Mills
09 Jun
2015
Categories : Data Security            Leave a comment           

Just encrypting data, like locking money in a vault, does not enable the business unless you can also make it available. So just as a vault would unlock at certain times but still resist attacks encrypted data must be able to be accessed securely while resisting compromise to various physical and logical threats. Vaults were not really that effective until banks could control how and when they could be opened; therefore, ergo encryption without access control, much like a vault […]

The Ramifications of the IRS Breach

Posted By: Alan Kessler, @kessalan
04 Jun
2015
Categories : Data Breach, Data Breach Disclosure            Leave a comment           

Last week, the IRS experienced a data breach affecting more than 100,000 citizens. The hackers accessed an IRS online system in order to obtain the personal information of taxpayers. News on this story has since generated a huge amount of coverage in major news outlets. Upon disclosing the attack, the IRS also stated the matter was under review by the Treasury Inspector General for Tax Administration as well as the IRS’s Criminal Investigation unit. ClickToTweet: Ramifications of the IRS Breach […]

02 Jun
2015
Categories : Data Security            Leave a comment           

As more and more sensitive data becomes compromised, cyber-crime presents not just an ever-growing threat to the economy, but also to citizens’ fundamental rights – this is according to the European Commission. ClickToTweet: At #InfoSec on Wednesday – Security as a business enabler by @solcates http://bit.ly/1BHBhRy Added just last week to this debate about citizen’s rights is also a new report from the U.N.’s David Kay that includes a focus on the fact that backdoors to encryption can’t be effectively […]