Category: Encryption

Categories : Data Security, Encryption            Leave a comment           

Downtime. Nobody likes it. Unplanned downtime is almost always expensive. A 2015 report from IDC also revealed that for the Fortune 1000, the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year. Planned downtime is also a pain. Before I was in the security business, I marketed network solutions that were “bumps on the wire” that required planned downtime for deployment. There were ways to minimize or even reduce the downtime, but they were […]

New Innovations for the New Year, Part One: The Short Term

Posted By: Sol Cates, @solcates (Twitter)
12 Jan
Categories : Cloud Computing, Cloud Security, Data Security, Encryption, Internet Of Things            Leave a comment           

This may sound obvious, but our industry is very reactive. It often feels like we, as security professionals, must wait in the wings until something disastrous happens. Then, and only then, are we allowed to develop and respond to technologic trends. So why does security consistently feel like it’s behind the curve? There are multiple reasons. We are all familiar with the dichotomy of security vs. convenience, which often positions security as the polar opposite of innovation. Many start-ups encourage a […]

Categories : Data Security, Encryption            Leave a comment           

In 2016, we saw organizations increasingly investing in a digital transformation strategy and any CIO worth their salt is going to continue to drive that change through 2017. In fact, Gartner’s 2017 CIO agenda survey found that more money is being invested into technologies that support shifts to digital services than in the past. At the same time, the board is increasing the pressure on CIOs to move the organization forward technologically in order to better compete in this ever-increasing […]

Docker data security – going from zero to hero

Posted By: Andy Kicklighter, @akicklighter (Twitter)
28 Dec
Categories : Data Security, Docker, Encryption            Leave a comment            Tags: ,

If you are already developing on Docker, you already know why interest is so high.  The combination of faster application delivery and evolution that it makes possible, easily scalable microservices, reusable standard images, and the possibility of reducing system licensing and management costs is nearly irresistible if you’ve adopted a DevOps strategy.  And a compelling reason to adopt one if you are not. For a look at just how hot Docker is, take a look at the Google trends search […]

Data Security & Identity Management: Essential 1st Cousins in IT Security

Posted By: Chris Olive, @ChrisEOlive (Twitter) | Senior Sales Engineer | Vormetric, a Thales company
15 Jul
Categories : Data Security, Encryption            1Comments           

As a senior architect, sales engineer, and consultant out in the field working closely with senior IT security leaders and CISOs, I sometimes run into questions surrounding the Vormetric product line related to identity management. Having implemented identity management solutions for Fortune 500 companies around the world for a number of years, I truly appreciate when these questions arise, as it demonstrates some understanding that “Data Security” and “Identity Management” are essential first cousins in IT Security. Click to Tweet: […]

RSA DPM: What Do You Do When “End-of-Life” Hits?

Posted By: Michael Rothschild, @mjrothschild
28 Jun
Categories : Data Protection, Data Security, Database Encryption, Encryption            Leave a comment           

I’ll grant you the topic sounds a little morbid, but it’s not what you think. I am referring to when an organization announces the end-of-life and subsequent end-of-product support for a product or service that you have relied on. Obviously, a range of issues immediately rise to the surface, such as culling a short list of replacement products, vetting them and ultimately selecting the best product to replace your current “dead man walking” product. It can be a daunting and […]

Encryption: A top priority on your data security list?

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
08 Oct
Categories : Data Security, Encryption            Leave a comment           

The idea behind initiatives like ‘National Cyber Security Awareness Month’ in the US and the on-going campaign in the UK of ‘Get Safe Online’ – is that each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. People, finances, devices and businesses must be better protected from fraud, abuse and other issues encountered online. ClickToTweet: Is #Encryption on your list for #GetSafeOnline & #CyberAware? I would […]

01 Sep
Categories : Data Security, Encryption            Leave a comment           

If you’re running a business, there’s a good chance you’re focused on reaching certain end goals. Two of those goals likely include both velocity and profitability. The Oxford Dictionary defines velocity as “the speed of something in a given direction” and profitability as “the degree to which a business or activity yields profit or financial gain.” Generally, the former – in some capacity, regardless of the industry – is necessary to achieve the latter. I bring this up not to […]

06 Aug
Categories : Data Security, Encryption            Leave a comment           

Ski helmets, seat belts, and encryption. What comes to your mind when you read these words? You may immediately think “safety,” and you’d be right, but how about “speed enablers”? At first blush, that may not be the first concept that comes to mind, but there’s a pretty compelling case to be made for this as another common theme. Let me give you a couple fun examples, starting with ski helmets. During the winter of 2002/2003 researchers studied different factors, […]

Five Reasons to Secure Your NoSQL Deployments

Posted By: Don Pinto - Couchbase, @NoSQLDon
25 Jun
Categories : Access Control, Application Encryption, Big Data, Encryption, Encryption Key Management            Leave a comment           

Recently, NoSQL databases have become very popular across enterprises and many of them are choosing Couchbase to power their web, mobile, and IoT applications. As more and more companies adopt NoSQL, the amount of sensitive data stored in these repositories is also rising. Typically, it is a standard practice for enterprises to put the database behind a firewall, and implement extensive security controls. But these technologies alone cannot protect an organization from data breaches and data leakage. ClickToTweet: 5 Reasons […]