Blog Authors

charlesCharles Goldberg
Senior Director, Marketing
radfordC.J Radford
Vice President of Cloud
socialtis2Tina Stewart
Vice President Marketing
Paul AyersPaul Ayers
VP EMEA

DEFENDERS OF DATA

Category: Encryption

15 Dec
2014

I try to keep on top of the news, particularly as it relates to the nature and severity of cyber attacks taking place. Sadly, there’s been no shortage of reading material lately. Last month, there were reports on breaches at Kmart and Dairy Queen (my family loves Blizzards). Updates then came out about a massive breach at Home Depot. Then more recently, there’s been the spate of nation-state attacks on the USPS, National Oceanic and Atmospheric Administration (NOAA), Sony Entertainment […]

12 Dec
2014

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security […]

01 Dec
2014
Categories : Big Data, Cloud Security, Data Breach, Data Security, Encryption, Privileged User            Leave a comment           

It’s the most wonderful time of the year! That’s right, it’s that time for my predictions about where things are headed in 2015. Before you break out the eggnog, don a sweater and settle in front of that roaring fire, I thought it might be fun to do a very brief “year in review” based on a year’s worth of blogs. <ClickToTweet>: 6 key #DataSecurity Predictions for 2015 from @kessalan CEO of @Vormetric http://bit.ly/1B7bA0g Early 2014 saw me counting down […]

13 Nov
2014
Categories : Cloud Computing, Data Encryption, Data Security, Encryption, Privileged User            Leave a comment           

A bit over a week ago some of our senior executives were in New York for a CSO summit. Our own CSO (Sol Cates) and CEO (Alan Kessler) were among those attending. One observation from the summit – this year’s sad (and still growing) total of data breaches is causing people to pause and reflect about how their security dollars are being spent, and how they could be used more effectively. <ClicktoTweet>: Twin Drivers to Reprioritize IT Security Spending @akicklighter […]

11 Nov
2014
Categories : Data Security, Encryption            Leave a comment           

Dear Valued Customer, The Home Depot has discovered that a file containing your email address may have been taken during the payment card breach we announced in September. The file contained email addresses, but it did not contain passwords, payment card information, or other sensitive personal information. We apologize for this incident and for the inconvenience and frustration this may cause you. In all likelihood this event will not impact you, but we recommend that you be on the alert […]

04 Nov
2014
Categories : Data Protection, Data Security, Encryption            Leave a comment           

Recently, I was in New York City for the Evanta Global CISO Summit, to moderate a discussion on the business imperative of data security. During the conference, a wide variety of security and privacy topics were covered. I was able to speak with and hear from CISOs from all walks of life, all of whom are focused on confronting modern-day security challenges and pushing information security to new levels of importance. Fortunately, the conference organizers stress the belief that collaboration […]

14 Oct
2014

Personal note: When I initially laid out this blog, I planned on stepping through recent revelations in the Dairy Queen breach. However, since my initial outline, Kmart was also breached. These breaches are happening at such a frequent pace, I can’t help but feel the larger story is about security flaws within the retail space. So instead of delivering yet another Dairy Queen article among the masses, I’d instead like to look at security flaws within the retail space as […]

06 Oct
2014

Data encryption is increasingly at the forefront of American conversations around cybersecurity. In fact, Fusion’s Daniel Rivero, citing government intrusion and overreach, went so far as to call it “the second amendment battle for the digital age.” Given October is National Cyber Security Awareness Month, it only seems appropriate to explore the benefits of encryption – a strategy that helps keep businesses accountable to their customers, partners, employees and stock holders. Click to Tweet: The Long Game of Encrypt Everything […]

08 Sep
2014
Categories : Big Data, Data Encryption, Database Encryption, Encryption            Leave a comment           

Intel’s AES-NI instructions are extensions to the x86 instruction set to perform AES encryption and decryption directly using Intel CPUs. In addition to being more secure, there are significant performance gains that accrue when using hardware-based encryption. Just as the AES encryption has become a universal and widely adopted standard for symmetric encryption, AES NI-enabled encryption has become the equivalent to a standard for x86-based applications performing hardware encryption starting with Intel’s Westmere processors. Click to Tweet:          ./@Vormetric #DataSecurity for […]

28 Aug
2014

As we’re winding down to the end of VMworld today, now is a good time to summarize some of the key data security trends we’re seeing at the event. The first is that data, and the security of data within VMware clouds and environments, is now a hot topic. Not only did VMware announce a set of critical features tied to enhancing data security in today’s environment of “deperimeterization” for networks with the release of NSX 6.1, but the topic […]