Blog Authors

Andy KicklighterAndy Kicklighter
Director of Product Marketing
socialtis2Tina Stewart
Vice President Marketing
Paul AyersPaul Ayers
VP EMEA
alankesslerAlan Kessler
President and CEO

DEFENDERS OF DATA

19 Aug
2014
Categories : Big Data, Data Breach Disclosure, security intelligence            Leave a comment           

Earlier this year the GAO reported that the number of security incidents for Federal Agencies involving Personally Identifiable Information (PII) increased 2.5x between 2009 and 2013. This year, with the rising tide of highly visible data breaches in retail, health care and other areas I’m expecting the picture to further deteriorate. Why is it this is the case?  Three key reasons appear: Lack of real penalties Inertia in IT Security investments Standards that drive only minimum behavior When a data […]

14 Aug
2014
Categories : Data Security            Leave a comment           

Black Hat 2014 was a great conference, and left me with some lasting impressions. The crowd- First and foremost, the crowd was a much different mix from RSA and other industry events.  Attendees were a very focused demographic – the people who have to actually do the work of protecting their organizations and implementing IT Security.  Looking at a traditional organization chart, you’d say that they were mostly mid-level security types and very technical.  But as the result of their […]

13 Aug
2014
Categories : Data Security            Leave a comment           

Meet Dawn Marie Hutchinson. Dawn was hired last year as the head of information security to keep Urban Outfitters void of future attacks. Dawn believes that Urban Outfitters should not have to disclose when a breach occurs.1 Dawn is not alone. She is among a group of executives taking a stand in a debate on the merits of disclosing attacks. With a belief system that breaches don’t always lead to harm, the organization is fighting for breaches to be handled […]

07 Aug
2014
Categories : Data Security            Leave a comment           

In the space of two short weeks, eBay’s ticket selling site StubHub and online bookmakers Paddy Power joined the already long list of 2014 data breaches. And, as always, important lessons can be drawn from these two events. In the first instance, and typical to almost every breach, what unites both is that personally identifiable information was stolen – including individual customer names, usernames, addresses, email addresses, phone contact numbers and dates of birth. But, what distinguishes the StubHub breach […]

06 Aug
2014
Categories : Data Security            Leave a comment           

Reading an article last weekend about everybody’s favourite hero and villain du jour, Edward Snowden, I was particularly struck by one comment: ” What last year’s revelations showed us,” said Snowden, ” was irrefutable evidence that unencrypted communications are no longer safe.” It’s a bold statement but one, I suspect, that will not surprise many.  Even before the Snowden revelations, it was commonplace for organisations to disclaim in their privacy policies that “no communication over the Internet can ever be […]

05 Aug
2014
Categories : Data Security            Leave a comment           

Back in April 2013, we investigated the motivations behind IT security spending. Our global online survey, targeted at IT professionals, found that newer IT trends – such as big data, cloud, BYOD and mobile security practices – were major security spending drivers. The survey gathered responses across a full range of markets – banking/financial services, retail, manufacturing, public sector and others. At the time, about 16 percent of respondents selected ‘data breaches’ as the primary data security driver at their […]

29 Jul
2014
Categories : Data Security            Leave a comment           

Big data analytics are proving a boon to business and government, enabling organizations to analyze whole sets of related data or data from disparate sets, for patterns and trends in ways never before possible.  Use cases are growing quickly, and we are only at the beginning of understanding how best to make use of this technology. Retail – Create a full profile of not only what people are buying, but the process they go through to make their selections.  Data […]

24 Jul
2014
Categories : Data Security            Leave a comment           

This seems to be the year that Cloud offerings, hosting providers and MSPs have turned the corner in readiness to support compliance requirements within their offerings.  For IaaS, I’m seeing our enterprise customers directly drive providers to support compliance related initiatives – meet the requirement or lose the business.  The same trend plays out in SaaS environments as well, but to a different “tune” – heavily differentiated or discrete offerings designed for specific industry segments. This change is clearly driven […]

22 Jul
2014
Categories : Data Security            Leave a comment           

Vormetric has now reached 1400 customers worldwide, with strong deployments in place and expanding throughout the US, Europe and Asia / Pacific regions.  In the vast majority of these customer implementations, compliance in all its many forms plays a primary role in customers’ decisions to deploy Vormetric solutions, and in fact, usually there is a need to meet multiple compliance requirements. Not surprising given the complex web of regulation, industry compliance requirements and privacy laws worldwide.  A short snapshot of […]

17 Jul
2014
Categories : Data Security            Leave a comment           

When thinking about data encryption, businesses typically view this as a proactive measure to avoid security breaches.  Naturally, this is correct – data that’s encrypted is harder to hack – but what’s often missed from the equation is how encryption can reduce organizational risk should a security breach still happen. This is because of the impact encryption has on businesses’ data breach reporting requirements.  Many countries around the world now have data breach reporting rules, and these can attract serious […]