Category: Data Security

30 May
2017
Categories : Data Security            Leave a comment           

The security community has long recognized the importance of code signing as a method to establish trust and integrity. It is now, however, becoming inescapable for independent software vendors (ISVs) and even ordinary users. These days, businesses need provably reliable ways to validate the authenticity and integrity of the electronic assets and, perhaps even more importantly in today’s threat landscape, prove that these items have not been tampered with or changed maliciously since they were created. But what happens when […]

CipherTrust Monitor 2.0

Posted By: Kristina Cairns, @kcairns2020 (Twitter)
24 May
2017
Categories : Data Security            Leave a comment           

Bringing Convenience, Cost Reduction & Increased Uptime for Thales e-Security Customers According to our 2017 Thales Global Data Threat Report, 68% of respondents have experienced a breach at some point, with more than one in four reporting breaches in the last year alone, up by 22% from the previous year. In this environment of ever-present threats, securing sensitive data has become a top priority for organizations. It’s thus no wonder that advanced techniques, such as encryption with strong key management, […]

Teaching old dogs new (data security) tricks

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
24 May
2017
Categories : Data Security            Leave a comment           

In light of the numerous recent hacks on high-profile companies, it would appear more UK organisations are waking up and taking action to ensure they don’t find themselves in the same situation. According to findings in our 2017 Data Threat Report: European edition, 63 per cent of UK businesses plan to increase IT security spend in 2017 – a huge jump from the 54 per cent we recorded in 2016. While this is certainly positive in theory, the worrying reality […]

Meeting GDPR compliance with a year to go

Posted By: Peter Carlisle J, Thales e-Security
19 May
2017
Categories : Data Security            Leave a comment           

There’s now less than a year until the EU General Data Protection Regulation (GDPR) comes into effect. Designed to harmonise data privacy laws across Europe and increase the protection of data privacy for EU citizens, the GDPR has been heralded as a major step forward for consumer protection, and is set to have a significant effect not only on companies within the EU, but also on those exporting data to countries outside the European Union. The GDPR requires a greater […]

What is code signing?

Posted By: Vikram Ramesh
16 May
2017
Categories : Data Security            Leave a comment           

Organizations implement the technology as a best practice to protect businesses, brands, partners, and users from infected software Let’s start with a basic definition. Code signing is a method of proving the origin and integrity of a file. The process involves digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. Code singing protects companies – along with their partners and users – from the […]

Top 5 Encryption ‘Gotchas’

Posted By: John Grimm
11 May
2017
Categories : Data Security            Leave a comment           

As encryption adoption increases, more challenges arise Nothing worth having comes easy. But good things come to those who encrypt (and do a good job managing the keys). According to our Global Encryption Trends Study, cloud adoption and escalating data security threats are accelerating encryption deployments. To be exact, the growth rate of companies with an encryption strategy reached the highest level in the past four years, with a total of 41 percent now reporting they have a consistent encryption […]

Is Cloud Computing Secure for your Sensitive Data?

Posted By: Peter Galvin, @Pgalvin63 on Twitter
08 May
2017
Categories : Data Security            Leave a comment           

Organizations across all industries leverage the power, agility and cost savings provided by cloud computing. It’s becoming clear that organizations are migrating their data to the cloud at a fast pace, and many organizations are even beginning to use multi-cloud environments. Fortunately, we have seen from our recent Global Encryption Trends Study that protecting data in the cloud has become a requirement for most organizations. As you may already know, encryption is a key technology that protects against data breaches, […]

Categories : Data Security            Leave a comment           

This blog first appeared on Securosis (https://securosis.com/blog/multi-cloud-key-management-selection-and-migration) Cloud services are typically described as sharing responsibility for security, but the reality is that you don’t working shoulder to shoulder with the vendor. Instead you implement security with the building blocks they provide you, possibly filling in gaps where they don’t provide solutions. One of the central goals of this research project was to show that it is possible to take control of data security, supplanting embedded encryption and key management services, […]

Global Encryption Trends

Posted By: Alan Kessler, @kessalan
02 May
2017
Categories : Data Security            Leave a comment           

In today’s digital world, data is the crown jewel, the pièce de résistance. And with the steady pace of major data breaches, securing sensitive data must be a top priority for organizations across the globe. In fact, Verizon’s recently issued 2017 Data Breach Incident Report analyzed 42,068 security incidents – of which 1,935 were data breaches – across 84 countries. The issue of cybersecurity is truly global in scale. Here’s what’s encouraging: countries around the world are waking up to […]

Categories : Data Security            Leave a comment           

The resale of cancelled and refunded tickets for this year’s Glastonbury Festival took place last weekend, with thousands of eager music fans visiting the website in the hope of securing a place in front of the world famous Pyramid Stage. Registration required purchasers to upload a passport photo of themselves, which would then be replicated on the paper ticket itself as a means of identification.  Such a process can be prone to errors, however, with wrongly sized images causing delays […]