Category: Data Security

Securing National Cyber Borders

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
09 May
2013

It was recently reported that Chinese cyber-spies hacked U.S. defense contractor QinetiQ North America’s computers for three years. These hackers compromised most (if not all) of the company’s research, including work on secret satellites, drones and software used by U.S. Special Forces.  According to a Pentagon spokesperson, the Pentagon is now working closely with QinetiQ to determine the exact scope of the breach. The unfortunate situation that QinetiQ faces is one that other companies and government can expect with greater […]

07 May
2013
Categories : Data Security            Leave a comment           

Over the years automation has been recognized as a word synonymous with efficiency and cost-savings. Why wouldn’t an organization want to automate more of their business processes and remove costly and often error-prone manual steps? The answer traditionally is that a certain scale is needed by an organization, an inflection point, in order to justify the upfront work to realize the longer-term efficiencies. Also, we’ve all worked at companies where team members become accustomed and even get very good at […]

Categories : Data Security            Leave a comment           

Well, readers – that’s it – Infosecurity has come and gone in barely the blink of an eye. Looking back over the past few weeks we’ve been talking here about the topics that we felt would form a large focus at Infosec – from securing the supply chain and APTs, to challenges around securing Big Data and meeting demands of new legislation. Although these topics all featured at the show, it’s interesting that a lot of the questions that visitors […]

The Data Breach Surveys: Part 1

Posted By: Tina Stewart, @socialTIS
25 Apr
2013
Categories : Data Breach, Data Protection, Data Security            Leave a comment           

Well, it’s been quite a week for security industry research and surveys. Not only did PwC release The Global State of Information Security Survey 2013, and Verizon release the 2013 Data Breach Investigations Report, we also released the results of our own Protect What Matters — Data Security global online survey. While the rich content contained in these three information sources is too vast to cover in any single blog post, I’d like to share my thoughts and observations with you over the coming […]

#Infosec13 is here!

Posted By: Vormetric
23 Apr
2013
Categories : Data Security            Leave a comment           

For the past several weeks our mini blog series has been building up to this moment (drum roll, please) – the start of Infosecurity Europe 2013! With the show opening its doors today, I wanted to share with you a flavour of what will be going on at Vormetric’s booth (#M65). In previous posts, we covered the subjects I felt would be the key talking points at the show – Big Data, the changing face of legislation, APTs – all […]

Categories : Data Security            Leave a comment           

Tales of the shadowy underworld of computer hacking and state-sponsored espionage might capture the imagination of many a Hollywood filmmaker or detective novelist, but recent incidents like those affecting The New York Times, Washington Post and Wall Street Journal, show that advanced hacking attacks are far from fictional. Cybercrime is a booming industry – and data the new black gold. Here at Vormetric, we believe that there are only two types of data: the kind that somebody wants to steal […]

Vormetric Goes to Washington

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
12 Apr
2013
Categories : Data Security            Leave a comment           

It was a very busy week for the federal team here at Vormetric. We had a number of great meetings on the topic of cyber security with both Senate committee members and members of the House. Given all the attention that data breaches and APTs have gotten in the press recently, the federal government is extremely eager for input, ideas and assistance from industry leaders relative to current federal programs, initiatives and cyber working groups. We also had interesting conversations […]

Your Cloud, Your Data and Data-centric Security

Posted By: Andy Kicklighter, @akicklighter (Twitter)
04 Apr
2013
Categories : Data Security            Leave a comment           

Recently reported in an Infoworld article was the fact that one in six Amazon S3 buckets have been left open for public access. S3 buckets (S3 stands for Simple Storage Service), for those of you who don’t regularly use Amazon Web Services infrastructure, are designed to store and serve static content for users of the Amazon cloud. So what was in those 1, 951 buckets set to “public”? Sales records, account information, employee personally identifiable information (PII), database backups and […]

Categories : Data Security            Leave a comment           

As we continue through our dedicated #Infosec13 series, my blog this week turns to the topic of data protection legislation and what the implications are for you. As the volume of breaches increases and national governments impose hefty fines, the pressure to protect the integrity and confidentiality of mission-critical information has never been greater. However, it’s not just the fear of financial penalties that’s putting the organisations I speak with under pressure, it’s the changing nature of the laws and […]

CSO Perspectives Recap: Data-Centric Security

Posted By: Alan Kessler, @kessalan
28 Mar
2013
Categories : Data Security            Leave a comment           

On March 21, I presented in the Third Annual CSO Perspectives Seminar on Cyber Security in Washington, D.C. I typically prefer morning presentation slots and this was no exception; the seminar attendees — representing the Department of Defense, Department of Homeland Security, Department of Treasury, Office of Inspector General, Federal Reserve Board, US Air Force, US Department of Commerce, and US Department of State, to name just a few — were extremely receptive to hearing about the latest techniques for […]