Categories : Data Security            Leave a comment           

There is no one-size-fits-all solution when it comes to working with and helping to support channel partners. There are more than 180,000 IT service providers in North America alone: some are large with big marketing budgets, others are smaller shops striving to become a “high-growth partner,” increase their customer base and remain competitive through innovative new offerings. Click to Tweet: Channel Marketing: How savvy partners leverage vendor resources to maximize business bit.ly/2dhnrSl pic.twitter.com/mgzaMUvM8Y Today’s IT vendors strive to have anywhere from […]

22 Sep
2016
Categories : Data Security            Leave a comment           

Organizations are learning (don’t worry, most have done the learning) that if they don’t do encryption right – people will have access to sensitive data. With encryption and other cryptographic technologies acting as building blocks within a larger, layered IT security strategy, it’s clear that there are multiple needs for these technologies across enterprises, as more information is collected, stored and used throughout organizations. But these basic security needs don’t just stop at the enterprise level. Cloud service providers need […]

Driving Connected Car Security Forward

Posted By: Jim Delorenzo
20 Sep
2016
Categories : Data Security            Leave a comment           

Like the Internet, the Internet of Things (IoT) is going to be a part of our everyday life, with an increasing number of devices establishing connections – from smart light bulbs to connected cars and everything in between. However, as businesses and individuals alike begin to enjoy the conveniences associated with increased connectivity, these clear benefits lead to clear vulnerabilities. Increased Connectivity = Increased Risks As we’ve seen many times, attackers can often hack into connected products with shocking ease. […]

Categories : Data Security            Leave a comment           

The reality is that many business leaders won’t do the right thing in terms of investing in security. At least not until they’re in some way coerced or forced into it. The headlines will keep appearing, detailing how consumer data continues to be exposed because some of the most basic safeguards weren’t employed. Just to be clear, I’m not saying that security is easy. There are a lot of sophisticated cyber adversaries and significant threats that are very difficult to […]

The impact of Government requests for backdoor access to encrypted data

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
09 Sep
2016
Categories : Data Security            Leave a comment           

Since the well-documented FBI–Apple encryption dispute made global headlines, there has been on-going debate as to whether governments should ever be granted special access to encrypted data. In the UK, the debate intensified following the announcement that the Investigatory Powers Bill (IPB) had been approved by the terror laws watchdog. The somewhat controversial act grants agencies the right to monitor online activities of citizens, and is supported by examples of instances when the monitoring of email, phone and internet behaviour […]

06 Sep
2016
Categories : Data Security            Leave a comment           

In late August, news outlets reported a group calling itself the “Shadow Brokers” had leaked a hacking tool belonging to the NSA’s Tailored Access Operations (TAO) team, otherwise known as the Equation Group. According to the New York Times, the leaked code “was designed to break through network firewalls and get inside the computer systems of competitors like Russia, China and Iran. That, in turn, allows the N.S.A. to place ‘implants’ in the system, which can lurk unseen for years […]

We really are buying IT Security tools to fight the last war

Posted By: Garrett Bekker, 451 Research
02 Sep
2016
Categories : Data Security            Leave a comment           

Towards the end of 2015, Vormetric, in conjunction with 451 Research, conducted a comprehensive global survey of security professionals to get a pulse on the state of the security industry’s level of preparedness to deal with threats to data, both from insiders as well as external threat actors.  Overall, the results of the 2016 Global Data Threat Report contained a mix of both surprising and not-so-surprising results.  At a high-level, however, one of the most notable aspects to come out […]

Categories : Data Security            Leave a comment           

It’s a pretty simple story once you get down to it. We found in the results of the report that Australian Enterprises that they feel very threatened by cyberattacks, and when you look at it there seem to be some pretty good reasons for it. Click to Tweet: Aussie #DataSecurity Pros under fire – 2016 #DataThreat Report bit.ly/2c5SQps pic.twitter.com/fJNNRRviGJ First let’s look at how vulnerable respondents felt to internal and external threats to data. The highest rate of “Extremely Vulnerable” […]

BYOK FOR Everyone: Choose Your Own Cloud

Posted By: Jon Geater, @jongeater
15 Aug
2016
Categories : Data Security            Leave a comment           

Last year we hit a turning point in cloud adoption for applications processing sensitive data.  According to our latest Ponemon/Thales Global Encryption Trends Study, for the first time more enterprises are sending sensitive data to the cloud than deferring out of fear over security risks. But at the same time more than half also said control of their encryption keys is vitally important to them, and that they would only use encryption keys they directly control inside their business. Click to […]

11 Aug
2016
Categories : Data Security            Leave a comment           

I’m sure you’ve seen endless articles about organizations jumping on the cloud computing bandwagon. I know what you’re thinking, how very 2013. But there is a fast growing trend in this shift to the “cloud” movement with enterprises increasingly deploying cloud infrastructures that are managed by service providers. Even enterprises (who traditionally invest in their own data center infrastructure and deploy “on premise”) are re-architecting their data centers to be service oriented (i.e. similar to that of a service provider’s […]