Category: Cloud Computing

New Innovations for the New Year, Part One: The Short Term

Posted By: Sol Cates, @solcates (Twitter)
12 Jan
Categories : Cloud Computing, Cloud Security, Data Security, Encryption, Internet Of Things            Leave a comment           

This may sound obvious, but our industry is very reactive. It often feels like we, as security professionals, must wait in the wings until something disastrous happens. Then, and only then, are we allowed to develop and respond to technologic trends. So why does security consistently feel like it’s behind the curve? There are multiple reasons. We are all familiar with the dichotomy of security vs. convenience, which often positions security as the polar opposite of innovation. Many start-ups encourage a […]

No Question – Enterprises are using SaaS – But Concerns About Data Are High

Posted By: Andy Kicklighter, @akicklighter (Twitter)
17 Jun
Categories : Cloud Computing, Cloud Security, Data Security            Leave a comment           

Enterprises today are migrating to the cloud whether there are security implications or not. But as SaaS usage grows, so too do concerns about meeting compliance, regulation and safety needs for sensitive enterprise data within SaaS environments. Click To Tweet: Enterprise #SaaS usage up,  even with sensitive data, & so are concerns @akicklighter In fact our 2016 Data Threat Report showed: 85 percent of enterprises reporting that they use sensitive data in cloud environments 53 percent using sensitive […]

(Data at) Rest Assured – CenturyLink and Vormetric Work Together to Secure Data at Rest

Posted By: Steve White, Director, Security and Compliance, CenturyLink Cloud
08 Jul
Categories : Cloud Computing, Cloud Security, Compliance, Data Security            Leave a comment           

As more and more companies move to a cloud model, businesses are giving up physical control of their data repository. If you are the customer and can walk to your server at any point in time, you have a pretty good sense that you are in control of the physical security controls that protect your data. When a company makes the decision to move to the cloud, they are entrusting the cloud provider with the sensitive data that matters most […]

Categories : Cloud Computing, Cloud Security            Leave a comment           

With more than 80 percent – the vast majority of enterprise businesses – now leveraging cloud environments, it’s no surprise that the infiltration of sensitive data into these environments is starting to turning heads. With that said, what can we do today to make both today’s and tomorrow’s use of cloud secure? ClickToTweet: Top 5 Cloud Security Challenges facing the Cloud Adopting Enterprise @cjrad #DefenderOfData To explore the topic further, this week, the Cloud Security Alliance is hosting its […]

When it comes to SaaS security concerns, cloud storage tops the list. In fact, 83 percent of U.S., and 72 percent of global respondents were very or extremely concerned about the protection of sensitive data within online storage environments, according to the 2015 Vormetric Insider Threat Report: Cloud and Big Data Edition. Enterprises struggle with being able to trust cloud storage users and providers. Users are often unaware of sensitive and unprotected data, which may result in compliance violations or, […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Top 4 Cloud Findings – Cloud and Big Data Insider Threat Report

Posted By: Andy Kicklighter, @akicklighter (Twitter)
26 Mar
Categories : Cloud Computing, Data Security            Leave a comment           

We just this week issued the Cloud and Big Data edition of the 2015 Vormetric Insider Threat Report.  In this edition we concentrated on the results relating directly to cloud and big data environments, and there were some real eye openers once we got a good look at the data. ClickToTweet: 60% of U.S. enterprises store sensitive data in the cloud – and they are worried about it #2015InsiderThreat First and foremost, we were very surprised at the rate […]


Posted By: Alan Kessler, @kessalan
03 Feb
Categories : Cloud Computing, Cloud Security, Data Breach, Insider Threat, Key Management, Privileged User            Leave a comment           

In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. <ClickToTweet>: IT Security Improvement – A Guide to the CIO’s Toolbox from @kessalan #DefenderOfData Data-at-rest is susceptible […]

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security […]

The Twin Drivers to Reprioritize IT Security Spending Now

Posted By: Andy Kicklighter, @akicklighter (Twitter)
13 Nov
Categories : Cloud Computing, Data Encryption, Data Security, Encryption, Privileged User            Leave a comment           

A bit over a week ago some of our senior executives were in New York for a CSO summit. Our own CSO (Sol Cates) and CEO (Alan Kessler) were among those attending. One observation from the summit – this year’s sad (and still growing) total of data breaches is causing people to pause and reflect about how their security dollars are being spent, and how they could be used more effectively. <ClicktoTweet>: Twin Drivers to Reprioritize IT Security Spending @akicklighter […]