Delivering Trust for Blockchain and Distributed Ledgers

Posted By: Peter Galvin, @Pgalvin63 on Twitter
08 Feb
2017
Categories : Data Security            Leave a comment           

It’s no secret that blockchain was one of the most impactful technology stories of 2016. Offering game-changing benefits over legacy systems, blockchain promises fast, immutable transactions at much lower cost for settlement, clearing and payment applications. Blockchain gained much of its notoriety as the technological backbone of Bitcoin, which enables transactions to be made and verified on a network instantaneously without a central authority. While cryptocurrencies may have become less popular, the technology behind their use continues to gain significant […]

07 Feb
2017
Categories : Data Security            Leave a comment           

Every day we are faced with scary statistics about our increasingly connected and digital world. Just recently, our Data Threat Report revealed that over two thirds of global organisations have experienced a data breach. Successful attacks on the likes of Yahoo and LinkedIn last year need not remind us of the consequences of falling victim to increasingly sophisticated hackers. But it’s not just global businesses facing the impending threat of hackers in today’s digital driven world – individuals are too. […]

RSA 2017 and our opportunities to lead

Posted By: Alan Kessler, @kessalan
06 Feb
2017
Categories : Data Security            Leave a comment           

RSA Conference 2017 is about to begin, and could data security be any more relevant today? I know I could say that every year – indeed in the lead up to RSA Conference 2016, I wrote about people recognizing data breaches as part of their daily lives. But a lot can happen in a year. Data security is headline news every day, multiple times a day. This year Thales comes to the world’s largest security conference with two priorities in […]

2017’s Most Surprising Data Threat Report Results

Posted By: Andy Kicklighter, @akicklighter (Twitter)
02 Feb
2017
Categories : Data Security            Leave a comment           

This is the second in our series on 2017 Data Threats – Read the initial post on “The Big Disconnect” here. In the just released 2017 Thales Data Threat Report – Global Edition developed by Thales with 451 Research, we had some surprising results in the data.  Some of these surprises were around new environments – our results around Containers was one of these – while others stressed just how much most enterprises HAVE NOT changed what they are doing, […]

New Innovations for the New Year, Part Two: The Long Term

Posted By: Sol Cates, @solcates (Twitter)
30 Jan
2017
Categories : Data Security            Leave a comment           

As I discussed in my previous post, the security industry often feels dangerously reactive to innovation. Instead of looking forward to the future, we are constantly playing catch up and filling in gaps as they emerge. Short term resolutions will always tend to be more reactive as a whole, but we can use the tools we develop today to prognosticate the future of our industry. Ultimately, our sector needs to find a proper balance between anticipation and reaction. Today, most […]

Today is the day you rethink your data security strategy

Posted By: Peter Galvin, @Pgalvin63 on Twitter
27 Jan
2017
Categories : Data Security            Leave a comment           

Today is Data Protection Day – a day established to remind us about the importance of improving our understanding of cyber threats and all things data security. This day was established 11 years ago and its purpose is more important than ever. Every organisation is, of course, well aware of the cyber security risks they currently face. The various high-profile hacks that occurred since Data Protection Day last year tell a cautionary tale – from Yahoo, in which one billion […]

26 Jan
2017
Categories : Data Security            Leave a comment           

Just released today, is the Global Edition of the 2017 Thales Data Threat Report – Written by 451 Research’s Principal Analyst for Information Security, Garrett Bekker.  Today, I’ll focus on just one of the stories found in the data set – the disconnect between enterprise’s increasing investments in IT security tools, and the fact that last year was a record year for data breaches …. Again. Click to Tweet: The Big Disconnect: Why is the #databreach rate up AND IT […]

25 Jan
2017
Categories : Data Security            Leave a comment           

The ever-growing number of applications and uses for mobile devices has long been a hot topic. Using mobiles to electronically sign transactions and documents is one such use case, and many organisations have been looking for mobile e-signature solutions, which could hold legal ground in court. Thanks to eIDAS, the EU regulation enforcing the standards that enable central signing solutions to deliver qualified electronic signatures (QES), it is now possible to eliminate the traditional problems with mobile signing (more on […]

Securing the Digital Transformation with Protected Access and Visibility

Posted By: Juan Asenjo, @asenjoJuan (Twitter)
25 Jan
2017
Categories : Data Security            Leave a comment           

Increasingly we are seeing more software moving to web-based applications. From cloud computing platforms such as Microsoft Azure and Amazon Web Services to SaaS products like Salesforce, this transformation of IT is driving tremendous changes in the industry. This is particularly true in the enterprise, where web applications are performing critical functions that use sensitive data. As CIOs implement their digital transformation strategies, it is important to understand how to protect critical applications and ensure that the data they process […]

24 Jan
2017
Categories : Data Security            Leave a comment           

Simply put: encryption is the most effective way for security professionals to protect their data. But, once you decide to encrypt, the question stops becoming “why” and becomes “how.” There are many different use cases in which sensitive data can reside, and thus there are seemingly endless ways to protect your data. These techniques include: full disk encryption, database encryption, file-level encryption, tokenization, dynamic data masking, and static data masking. And this is just naming a few. Confused? Don’t worry, […]