Category: Encryption

08 Oct
Categories : Data Security, Encryption            Leave a comment           

The idea behind initiatives like ‘National Cyber Security Awareness Month’ in the US and the on-going campaign in the UK of ‘Get Safe Online’ – is that each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. People, finances, devices and businesses must be better protected from fraud, abuse and other issues encountered online. ClickToTweet: Is #Encryption on your list for #GetSafeOnline & #CyberAware? I would […]

01 Sep
Categories : Data Security, Encryption            1Comments           

If you’re running a business, there’s a good chance you’re focused on reaching certain end goals. Two of those goals likely include both velocity and profitability. The Oxford Dictionary defines velocity as “the speed of something in a given direction” and profitability as “the degree to which a business or activity yields profit or financial gain.” Generally, the former – in some capacity, regardless of the industry – is necessary to achieve the latter. I bring this up not to […]

06 Aug
Categories : Data Security, Encryption            Leave a comment           

Ski helmets, seat belts, and encryption. What comes to your mind when you read these words? You may immediately think “safety,” and you’d be right, but how about “speed enablers”? At first blush, that may not be the first concept that comes to mind, but there’s a pretty compelling case to be made for this as another common theme. Let me give you a couple fun examples, starting with ski helmets. During the winter of 2002/2003 researchers studied different factors, […]

Five Reasons to Secure Your NoSQL Deployments

Posted By: Don Pinto - Couchbase, @NoSQLDon
25 Jun
Categories : Access Control, Application Encryption, Big Data, Encryption, Encryption Key Management            Leave a comment           

Recently, NoSQL databases have become very popular across enterprises and many of them are choosing Couchbase to power their web, mobile, and IoT applications. As more and more companies adopt NoSQL, the amount of sensitive data stored in these repositories is also rising. Typically, it is a standard practice for enterprises to put the database behind a firewall, and implement extensive security controls. But these technologies alone cannot protect an organization from data breaches and data leakage. ClickToTweet: 5 Reasons […]

Vormetric and Teradata: Building on Mutual Strength

Posted By: derektumulak, @tumulak
22 Apr
Categories : Big Data, Data Security, Encryption, Encryption Key Management, Teradata Encryption            Leave a comment           

Any party bent on destruction, exposing proprietary business intelligence and sensitive customer information like credit card numbers and medical information can try to get access. But what’s more important is learning how to protect it. ClickToTweet: Easily, Efficiently Encrypt Teradata w/@Vormetric’s Data Protection Platform #DefenderOfData While data is crucial to enhance company product offerings and capture increased market share, when it’s not properly protected, it can be exploited. However the very advantage big data solutions provide — the ability to […]

08 Apr
Categories : Access Control, Cloud Encryption Gateway, Cloud Security, Cloud Storage Encryption, Encryption            Leave a comment           

New Product – The Vormetric Cloud Encryption Gateway In our professional lives, we’re often confronted with a choice between expediency and security. In that arena, security, more often than not, comes out the loser. Employees have grown increasingly reliant on technology, and if a new technology helps them to do their jobs better, faster, or more efficiently, they’ll use that technology—security consequences be damned [with little or no consideration of the security risks they may introduce]. ClickToTweet: Security & Expediency […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Categories : Access Control, Application Encryption, Encryption, Encryption Key Management, HIPAA, HITECH            Leave a comment           

Code Blue For Your Healthcare Data Few look forward to a doctor’s visit. Unfortunately, this is more the case than ever before, and it is not because of what you might think. Today, patients worry about the information they may have to divulge at the doctor’s office and where it might end up. They say that the best way to stay healthy is to not go to the doctor at all and alarmingly it may also be the best way […]

12 Feb

When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a thing of the past. ClickToTweet: Why a Data Security Platform is an Enterprise Priority #DefenderOfData Before we get started on recovery, here are a few things you need to ask yourself: How much […]

What We Talk About When We Talk About Insider Threats

Posted By: Alan Kessler, @kessalan
05 Jan
Categories : Access Control, APT, Cloud Security, Data Breach, Data Breach Disclosure, Data Security, Encryption            Leave a comment           

What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions. <ClickToTweet>: Insider Threats – More than just malicious insiders #DefenderOfData But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be […]