Category: Access Control

Categories : Access Control, Data Protection, Data Security, SaaS Encryption            Leave a comment           

Whether it’s intellectual property, customer identifiable information, or next quarter’s financial results, sensitive data is arguably the most valuable asset that an organization can have. Should it fall into the wrong hands, misused data can result in major lawsuits, financial upheaval, and a fundamental loss of trust, not to mention major customer churn. In response to recent breaches and with the massive adoption of the cloud, regulators around the world are enhancing existing data security compliance requirements, implementing new legal […]

Categories : Access Control, Data Encryption, Data Security            Leave a comment           

Service Level Agreements (SLAs) directly involve continuous effort and improvement, significant technical investments and integration; and whether implied or explicit all business have them. Once an organization is consistently meeting their SLAs, the tolerance for change decreases and so goes the saying, “if it ain’t broke, do not fix it”. ClickToTweet: SLAs – Not enough without a Security Level Agreement too http://bit.ly/1QXmNpg pic.twitter.com/ll9ixmOALK Now we have a new, and far too often only implied Security SLA meaning “though shalt protect my […]

Five Reasons to Secure Your NoSQL Deployments

Posted By: Don Pinto - Couchbase, @NoSQLDon
25 Jun
2015
Categories : Access Control, Application Encryption, Big Data, Encryption, Encryption Key Management            Leave a comment           

Recently, NoSQL databases have become very popular across enterprises and many of them are choosing Couchbase to power their web, mobile, and IoT applications. As more and more companies adopt NoSQL, the amount of sensitive data stored in these repositories is also rising. Typically, it is a standard practice for enterprises to put the database behind a firewall, and implement extensive security controls. But these technologies alone cannot protect an organization from data breaches and data leakage. ClickToTweet: 5 Reasons […]

08 Apr
2015
Categories : Access Control, Cloud Encryption Gateway, Cloud Security, Cloud Storage Encryption, Encryption            Leave a comment           

New Product – The Vormetric Cloud Encryption Gateway In our professional lives, we’re often confronted with a choice between expediency and security. In that arena, security, more often than not, comes out the loser. Employees have grown increasingly reliant on technology, and if a new technology helps them to do their jobs better, faster, or more efficiently, they’ll use that technology—security consequences be damned [with little or no consideration of the security risks they may introduce]. ClickToTweet: Security & Expediency […]

Healthcare Data – An Ounce of Prevention is Worth A Pound Of Cure

Posted By: Michael Rothschild, @mjrothschild
20 Mar
2015
Categories : Access Control, Application Encryption, Encryption, Encryption Key Management, HIPAA, HITECH            Leave a comment           

Code Blue For Your Healthcare Data Few look forward to a doctor’s visit. Unfortunately, this is more the case than ever before, and it is not because of what you might think. Today, patients worry about the information they may have to divulge at the doctor’s office and where it might end up. They say that the best way to stay healthy is to not go to the doctor at all and alarmingly it may also be the best way […]

8 Elements of Personal Data Policies for IoT

Posted By: Andy Kicklighter, @akicklighter (Twitter)
18 Mar
2015
Categories : Access Control, Data Security            Leave a comment           

Given the current global furor over continuing data breaches, Edward Snowden disclosures, the hue and cry around NSA data collection from mobile phones and mobile encryption, now is a good time to stop and think before we plunge wholesale into even more extensive collection of personal information from IoT environments and devices. Think how much worse a breach of data could be if it includes full profiles of people’s movements, actions, eating habits, purchase preferences or even more personal information.  […]

05 Mar
2015
Categories : Access Control, Big Data, Data Security            Leave a comment           

About two weeks ago I attended the Strata + HADOOP world conference, February 2015, in San Jose.  I think the most notable observation from an IT perspective is that people are getting serious about it. The second is that the technology driving the HADOOP ecosystem is evolving at warp speed. ClickToTweet: Security in the Data Lake from Strata + Hadoop @AshvinKamaraju #DefenderOfData http://bit.ly/1FZjgkm One example for security – Cloudera now says that “Security is Foundational” and the new default. Cloudera […]

Categories : Access Control, APT, Database Encryption            Leave a comment           

Following a recent investigation by Sky News, it’s been revealed that PaymyPCN.net, a private firm which allows drivers to pay fines via its website and has a direct link to the Driver and Vehicle Licensing Agency (DVLA) database, had been affected by a backdoor which gave access to restricted information. Although we’ve seen many headlines that highlight the danger posed by APTs and the like, it seems many organizations are still unprepared for attacks or unidentified weaknesses at a more […]

12 Feb
2015

When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a thing of the past. ClickToTweet: Why a Data Security Platform is an Enterprise Priority #DefenderOfData http://bit.ly/1uLLONG Before we get started on recovery, here are a few things you need to ask yourself: How much […]

Categories : Access Control, Big Data, Cloud Security, Data Breach, Data Security, Insider Threat            Leave a comment           

While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking alongside using physical force. Today we issued our 2015 Vormetric Insider Threat report. Coming off of the Sony breach and Obama’s State of the Union address, we can’t think of a better time to […]