Category: Cloud Security

New Innovations for the New Year, Part One: The Short Term

Posted By: Sol Cates, @solcates (Twitter)
12 Jan
2017
Categories : Cloud Computing, Cloud Security, Data Security, Encryption, Internet Of Things            Leave a comment           

This may sound obvious, but our industry is very reactive. It often feels like we, as security professionals, must wait in the wings until something disastrous happens. Then, and only then, are we allowed to develop and respond to technologic trends. So why does security consistently feel like it’s behind the curve? There are multiple reasons. We are all familiar with the dichotomy of security vs. convenience, which often positions security as the polar opposite of innovation. Many start-ups encourage a […]

No Question – Enterprises are using SaaS – But Concerns About Data Are High

Posted By: Andy Kicklighter, @akicklighter (Twitter)
17 Jun
2016
Categories : Cloud Computing, Cloud Security, Data Security            Leave a comment           

Enterprises today are migrating to the cloud whether there are security implications or not. But as SaaS usage grows, so too do concerns about meeting compliance, regulation and safety needs for sensitive enterprise data within SaaS environments. Click To Tweet: Enterprise #SaaS usage up,  even with sensitive data, & so are concerns @akicklighter bit.ly/1ZX2m03 pic.twitter.com/1aSM0McULi In fact our 2016 Data Threat Report showed: 85 percent of enterprises reporting that they use sensitive data in cloud environments 53 percent using sensitive […]

(Data at) Rest Assured – CenturyLink and Vormetric Work Together to Secure Data at Rest

Posted By: Steve White, Director, Security and Compliance, CenturyLink Cloud
08 Jul
2015
Categories : Cloud Computing, Cloud Security, Compliance, Data Security            Leave a comment           

As more and more companies move to a cloud model, businesses are giving up physical control of their data repository. If you are the customer and can walk to your server at any point in time, you have a pretty good sense that you are in control of the physical security controls that protect your data. When a company makes the decision to move to the cloud, they are entrusting the cloud provider with the sensitive data that matters most […]

Categories : Cloud Computing, Cloud Security            Leave a comment           

With more than 80 percent – the vast majority of enterprise businesses – now leveraging cloud environments, it’s no surprise that the infiltration of sensitive data into these environments is starting to turning heads. With that said, what can we do today to make both today’s and tomorrow’s use of cloud secure? ClickToTweet: Top 5 Cloud Security Challenges facing the Cloud Adopting Enterprise @cjrad #DefenderOfData http://bit.ly/1aJjths To explore the topic further, this week, the Cloud Security Alliance is hosting its […]

08 Apr
2015
Categories : Access Control, Cloud Encryption Gateway, Cloud Security, Cloud Storage Encryption, Encryption            Leave a comment           

New Product – The Vormetric Cloud Encryption Gateway In our professional lives, we’re often confronted with a choice between expediency and security. In that arena, security, more often than not, comes out the loser. Employees have grown increasingly reliant on technology, and if a new technology helps them to do their jobs better, faster, or more efficiently, they’ll use that technology—security consequences be damned [with little or no consideration of the security risks they may introduce]. ClickToTweet: Security & Expediency […]

When it comes to SaaS security concerns, cloud storage tops the list. In fact, 83 percent of U.S., and 72 percent of global respondents were very or extremely concerned about the protection of sensitive data within online storage environments, according to the 2015 Vormetric Insider Threat Report: Cloud and Big Data Edition. Enterprises struggle with being able to trust cloud storage users and providers. Users are often unaware of sensitive and unprotected data, which may result in compliance violations or, […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr
2015

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

A GUIDE TO THE CIO’S TOOLBOX

Posted By: Alan Kessler, @kessalan
03 Feb
2015
Categories : Cloud Computing, Cloud Security, Data Breach, Insider Threat, Key Management, Privileged User            Leave a comment           

In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. <ClickToTweet>: IT Security Improvement – A Guide to the CIO’s Toolbox from @kessalan #DefenderOfData http://bit.ly/1yz8Hjy Data-at-rest is susceptible […]

Categories : Access Control, Big Data, Cloud Security, Data Breach, Data Security, Insider Threat            Leave a comment           

While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking alongside using physical force. Today we issued our 2015 Vormetric Insider Threat report. Coming off of the Sony breach and Obama’s State of the Union address, we can’t think of a better time to […]

What We Talk About When We Talk About Insider Threats

Posted By: Alan Kessler, @kessalan
05 Jan
2015
Categories : Access Control, APT, Cloud Security, Data Breach, Data Breach Disclosure, Data Security, Encryption            Leave a comment           

What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions. <ClickToTweet>: Insider Threats – More than just malicious insiders http://bit.ly/1rZpr5L #DefenderOfData But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be […]