2017’s Most Surprising Data Threat Report Results

Posted By: Andy Kicklighter, @akicklighter (Twitter)
02 Feb
2017
Categories : Data Security            Leave a comment           

This is the second in our series on 2017 Data Threats – Read the initial post on “The Big Disconnect” here. In the just released 2017 Thales Data Threat Report – Global Edition developed by Thales with 451 Research, we had some surprising results in the data.  Some of these surprises were around new environments – our results around Containers was one of these – while others stressed just how much most enterprises HAVE NOT changed what they are doing, […]

New Innovations for the New Year, Part Two: The Long Term

Posted By: Sol Cates, @solcates (Twitter)
30 Jan
2017
Categories : Data Security            Leave a comment           

As I discussed in my previous post, the security industry often feels dangerously reactive to innovation. Instead of looking forward to the future, we are constantly playing catch up and filling in gaps as they emerge. Short term resolutions will always tend to be more reactive as a whole, but we can use the tools we develop today to prognosticate the future of our industry. Ultimately, our sector needs to find a proper balance between anticipation and reaction. Today, most […]

Today is the day you rethink your data security strategy

Posted By: Peter Galvin, @Pgalvin63 on Twitter
27 Jan
2017
Categories : Data Security            Leave a comment           

Today is Data Protection Day – a day established to remind us about the importance of improving our understanding of cyber threats and all things data security. This day was established 11 years ago and its purpose is more important than ever. Every organisation is, of course, well aware of the cyber security risks they currently face. The various high-profile hacks that occurred since Data Protection Day last year tell a cautionary tale – from Yahoo, in which one billion […]

26 Jan
2017
Categories : Data Security            Leave a comment           

Just released today, is the Global Edition of the 2017 Thales Data Threat Report – Written by 451 Research’s Principal Analyst for Information Security, Garrett Bekker.  Today, I’ll focus on just one of the stories found in the data set – the disconnect between enterprise’s increasing investments in IT security tools, and the fact that last year was a record year for data breaches …. Again. Click to Tweet: The Big Disconnect: Why is the #databreach rate up AND IT […]

25 Jan
2017
Categories : Data Security            Leave a comment           

The ever-growing number of applications and uses for mobile devices has long been a hot topic. Using mobiles to electronically sign transactions and documents is one such use case, and many organisations have been looking for mobile e-signature solutions, which could hold legal ground in court. Thanks to eIDAS, the EU regulation enforcing the standards that enable central signing solutions to deliver qualified electronic signatures (QES), it is now possible to eliminate the traditional problems with mobile signing (more on […]

Securing the Digital Transformation with Protected Access and Visibility

Posted By: Juan Asenjo, @asenjoJuan (Twitter)
25 Jan
2017
Categories : Data Security            Leave a comment           

Increasingly we are seeing more software moving to web-based applications. From cloud computing platforms such as Microsoft Azure and Amazon Web Services to SaaS products like Salesforce, this transformation of IT is driving tremendous changes in the industry. This is particularly true in the enterprise, where web applications are performing critical functions that use sensitive data. As CIOs implement their digital transformation strategies, it is important to understand how to protect critical applications and ensure that the data they process […]

24 Jan
2017
Categories : Data Security            Leave a comment           

Simply put: encryption is the most effective way for security professionals to protect their data. But, once you decide to encrypt, the question stops becoming “why” and becomes “how.” There are many different use cases in which sensitive data can reside, and thus there are seemingly endless ways to protect your data. These techniques include: full disk encryption, database encryption, file-level encryption, tokenization, dynamic data masking, and static data masking. And this is just naming a few. Confused? Don’t worry, […]

Fuel your digital eIDAS transformation

Posted By: Francesco Perrotta
23 Jan
2017
Categories : Data Security            Leave a comment           

In July last year EU Regulation N. 910/2014, also known as eIDAS, came into force – designed to harmonize national regulations around electronic signatures and digital identity and ensure the legal and technological interoperability of electronic identification systems. Its enforcement will drive the domestic market towards the digitization of document-based processes, and will therefore increase the use of electronic signature systems, long-term signature and document preservation systems, and strong authentication mechanisms, all of which will, ultimately, lead to an increase […]

18 Jan
2017
Categories : Data Security            Leave a comment           

Much has already been written on eIDAS, the new EU regulation on electronic identification and trust services; that it holds the promise of a safer and more integrated digital Europe, for example, or that it will make our everyday lives easier – whether opening a bank account or enrolling in a foreign university. However a task such as opening a bank account in the EU country of which you are a national – let alone one in a neighbouring country […]

Categories : Data Security, Encryption            Leave a comment           

Downtime. Nobody likes it. Unplanned downtime is almost always expensive. A 2015 report from IDC also revealed that for the Fortune 1000, the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year. Planned downtime is also a pain. Before I was in the security business, I marketed network solutions that were “bumps on the wire” that required planned downtime for deployment. There were ways to minimize or even reduce the downtime, but they were […]