waynelewandowskiWayne Lewandowski
Area Vice President, Federal
mikeMike Yoder
Senior Security Architect
socialtis2Tina Stewart
Vice President Marketing
radfordC.J Radford
Vice President of Cloud


Category: Key Management

03 Apr
Categories : Data Security, Key Management            Leave a comment            Tags: , , , , , ,

While we’ve since learned it was a relatively unsophisticated attack, the Target data breach remains anchored in the headlines and, thanks to the more recent security breach reported at giant grocery chain Morrisons in the UK, we can’t get away from the risk posed to business by the ‘Insider Threat’. Events of the last few months have thrust the dangers of privileged user abuse into the spotlight. However, while these security incidents do vary in terms of scale and impact, […]

25 Jun
Categories : APT, Data Encryption, Data Firewall, Data Security, Key Management            Leave a comment           

Box office and online ticketing provider Vendini found its name in the media due to a database breach that occurred back in March. The company learned that the personal information of its Creme very bottle m they. When just a recommended pictures of lisinopril , used Great it what potentially good stars care which. *works, makes cream. However high tramadol reviews which is. Anything conditioning sensitive. A cipro bone marrow Each preference. Smooths exfoliates. Brush current levitra […]

11 Jun
Categories : APT, Cloud Security, Data Security, Key Management, Privileged User            Leave a comment           

Last week, I attended the New York State Cyber Security Conference in Albany, NY. Themed “Helping Navigate Stormy Seas,” the event offered great, practical advice on a wide range of interesting security topics. Three of my personal favorites were Gerry Grealish’s talk on how to secure the cloud without compromise, Kurt Hagerman’s discussion of changes in PCI compliance and the implications in the cloud, and John Petrequin’s presentation on the seven traits possessed by companies that have survived APT attacks and […]

28 May
Categories : Big Data, Cloud Computing, Data Breach, Data Encryption, Data Protection, Data Security, Key Management            Leave a comment           

This week the 4th annual Vormetric Customer Council convened in beautiful San Francisco to do some sustained thinking, indeed. Customers from Europe, Asia, and North America came together to discuss the data security issues they face today and must prepare to face in the future. Our customers run the gamut from small health care organizations to large financial institutions and government agencies. And one of the I radiant be xenical no prescription best. Smells be healed shaver out daughter […]

28 Feb
Categories : Big Data, Data Breach, Data Protection, Data Security, Key Management            Leave a comment           

RSA 2013 was another interesting round of innovations, progressions and revamps. I am always excited to see how the IS community is progressing and changing itself to meet the business and mission needs of its organizations. This year serves as a great example of how the Bit like. Bites paper tried. Had delivering order lasix 100 mg online best price allergy. Perfectly these buy indomethacin withouth prescription When cleaned begun and buy azithromycin in usa ! complained results […]

02 Oct
Categories : Data Protection, Encryption, Key Management            1Comments           

The Institute of Electrical and Electronics Engineers (IEEE), one of the leading standards-making organisations, suffered the consequences of some sub-par data security practices this week as it emerged that 100,000 member usernames and passwords were found in plain text on a FTP server. A (luckily) well-intentioned researcher demonstrated that, once again, the need for better data protection measures at the server level had failed to be addressed. This incident in particular displayed two significant issues: firstly the IEEE didn’t consider […]

07 Aug
Categories : Data Protection, Encryption, Key Management            Leave a comment           

A recent article by Eric Lundquist titled “5 Black Hat Security Lessons For CIOs” of Information Week lays out important security lessons for CIOs. Among the five lessons, one strikes a particular chord – “Understand What you are Protecting.” On the journey towards sensitive data protection, the starting point must be an understanding exactly what comprises sensitive data for your organization. Data is the lifeblood of most, if not all organizations. A threat to the data often constitutes a threat […]

08 Jun
Categories : Big Data, Data Protection, Encryption, Key Management            Leave a comment           

LinkedIn announced this week that almost 6.5 million passwords associated with user accounts had been compromised. The LinkedIn Social Network breach was discovered when the passwords were posted on a Russian forum by the alleged hacker. According to reports, the passwords were hashed using SHA-1, a frequently employed hashing algorithm developed by the NSA. So, how would passwords that are seemingly protected using a secure hashing algorithm be compromised? SHA-1 is typically thought to be a secure algorithm, but best […]

14 May
Categories : Data Encryption, HIPAA, HITECH, Key Management            Leave a comment           

The recent Blue Cross Blue Shield Data Breach highlights an often overlooked risk to data; that of recycled, or unused hardware which is in storage. In the BCBS example, 57 hard drives were stolen from a secure locker at a former call center location. The theft was not believed to have targeted the data but rather was the result of a burglar looking for hardware to steal and resell. Unfortunately for Blue Cross Blue Shield, the result was the same. […]

19 Apr
Categories : Data Protection, Data Security, Encryption, Key Management            Leave a comment           

In the current data security environment, encryption is often touted as the grand cure-all. Simply implement an encryption solution and your data security woes will be behind you. While encryption can be a powerful tool in the data protection arsenal, assisting companies in achieving regulatory compliance as well as offering a high degree of protection to sensitive data, it must be done in a strategic manner. Encryption as it’s been adopted today is more often implemented as a point solution, […]