Categories : Data Security            Leave a comment           

You can read every review about a car, but you won’t begin to appreciate it until you go to a dealer and drive it. So it goes with nearly any product. For information technology buyers, it’s a big challenge: IT product vendors layer additional capabilities and features on core products. You read about them on data sheets, watch demonstration videos, even start to touch products at trade show demos (often with a member of staff standing a bit too close). […]

Categories : Data Security            Leave a comment           

As ‘digital’ extends further into the realms of the healthcare industry, thanks to the rise of mobile products and the Internet of Things (IoT), it is no longer just consumer PCs, enterprise networks and government agencies that are targets for highly sophisticated cyber-attacks – it is medical devices too. With personally identifiable information (PII) of patients being the prize, hackers are increasingly honing their skills to get their hands on this valuable data. And unfortunately, they’re getting good at it […]

Categories : Data Security            Leave a comment           

In order to protect our data in the medium term the algorithms and protocols used must be resistant to developments in Quantum Computing that could result in many conventional public key algorithms becoming breakable – that is, reversible from the public key. As new algorithms and mechanisms are proposed how should they be safely included in systems without ultimately undermining security because of their immaturity? Several areas of mathematics are being considered as possibly resistant to quantum computer attacks. These […]

HIMSS 2017: Data Security Highlights

Posted By: Jim DeLorenzo
23 Feb
2017
Categories : Data Security            Leave a comment           

With our Healthcare Data Threat Report announced just this week, I was not surprised to see that one of our key findings aligned with the topics being discussed at the HIMSS conference. Based on my observations on the exhibit floor as well as my conversations with healthcare IT professionals and security consultants, one key theme from the report bears out: When it comes to protecting electronic personal health information (ePHI), the focus for many healthcare IT teams is still on […]

5 Steps to Win over the Channel – and Best Position Your Products

Posted By: Michael Rothschild, @mjrothschild
22 Feb
2017
Categories : Data Security            Leave a comment           

It is not surprising that organizations are faced with an increasingly complex business environment. More competition, razor thin margins and increased competition yields more challenges to the business than ever before. At the same time the operating business environment has produced IT and security challenges that were often not even on the radar five years ago. Take security, for example. It was not all that long ago that hackers were the “bad outsiders” looking to develop their reputations as professional […]

The Good (and Bad) About Healthcare Data Security in 2017

Posted By: Andy Kicklighter, @akicklighter (Twitter)
21 Feb
2017
Categories : Data Security            Leave a comment           

In the Healthcare Edition of the 2017 Thales data Threat report, we were able to focus down on the specific results and behaviors of healthcare enterprises not only in the U.S. this year, but also around the globe.  We extended our sample size to include results from healthcare organizations in every geography that we surveyed.  In this blog, I’ll cover the highlights of what we found not only in the U.S., but also any contrasting results from elsewhere. Click to […]

RSA Conference 2017: Highlights and Innovations

Posted By: Sol Cates, @solcates (Twitter)
15 Feb
2017
Categories : Data Security            2Comments           

It goes without saying, really, but RSA Conference is the biggest cybersecurity convention of the year. From all across the world, private sector and government leaders come to San Francisco to inspect the latest innovations our industry has to offer. RSA Conference 2017 remains important, but I have seen a noticeable shift in the conversations our sector wishes to discuss. In the following blog post, I will examine the top four highlights and innovations I have seen so far this […]

15 Feb
2017
Categories : Data Security            1Comments           

As Marc Andreessen once said, “software is eating the world”. As technology becomes a differentiator in all market segments, we’ve seen an explosion in the development and use of software over the past decade. Driving this innovation is the ease of consumption afforded by the roll-out of high speed internet connections everywhere as well as the miniaturisation of devices that can consume digital services. Verifying the state of your on-premise or in-cloud digital infrastructure on you iPhone whilst ordering a skinny […]

Categories : Data Security            Leave a comment           

In order to protect our data in the medium term the algorithms and protocols used must be resistant to developments in Quantum Computing that could result in many conventional public key algorithms becoming breakable – that is, reversible from the public key. One of the uses of public key cryptography is Key Agreement (also known as Key Exchange), which typically uses the Diffie-Hellman mechanism, and its Elliptic Curve equivalents. Replacement mechanisms have been proposed for Diffie-Hellman, notably New Hope, as […]

Categories : Data Security            Leave a comment           

Governments do ask cloud providers to hand over their customers’ data. Last week there was another reminder when a Federal Court said Google must turn over data in foreign servers. This reminder underlies one of the reasons it is important to not only encrypt your data in the cloud, but to assure that you are the custodian of the encryption keys. Thales is making two announcements about new cloud key management capabilities at the RSA Conference this week that will […]