Categories : Data Security            Leave a comment           

For businesses that handle sensitive data affected by regulations, outsourcing has become a critical security concern. Not surprisingly, sharing and securing data in the supply chain is one of the hot topics being covered in the keynote theatre at this year’s InfoSec13 show next month. In kicking off our series of Infosec-themed blog posts, I wanted to talk about data protection best practices in the context of outsourcing business information to third parties. The outsourcing of laborious or indeed specialist […]

Insights from our Data Breach Webinar

Posted By: Tina Stewart, @socialTIS
21 Mar
2013
Categories : Cloud Computing, Data Breach, Data Security            Leave a comment           

On March 12, I participated in a webcast webinar with SC Magazine on how to guard against a data breach. The webinar content highlighted the results of SCMagazine’s 6th annual data breach survey which polled IT security professionals in the US, UK and Australia, and also featured Stephen Fridakis, CISO at the Food and Agriculture Organization of the United Nations, who shared his interpretation of the results and discussed the various measures he and his peers intend to implement in order to keep data out of the wrong […]

What will matter at #Infosec13?

Posted By: Vormetric
19 Mar
2013
Categories : Data Security, Database Encryption            Leave a comment           

Well, it’s almost that time of year again – and doesn’t it come around quickly? I’m talking about the highlight of the European security calendar (unless you’re counting the upcoming SC Europe Awards where I’m delighted to say that Vormetric is shortlisted in two categories) — Infosecurity Europe, which takes place April 23-25 in London. So, what will the hot topics be this year? BYOD and protecting mobile have been key trends over the past few years, and I expect […]

Security Intelligence and Data Protection

Posted By: Tina Stewart, @socialTIS
14 Mar
2013
Categories : Data Security            Leave a comment           

In testimony to the US Congress this week, Director of National Intelligence James Clapper highlighted the threat of foreign agents penetrating US computer networks to steal secrets. His commentary highlighted state actors (suggestion: read the Mandiant report), hactivists, and cybercriminals as being at the top of his list of potential threats. No matter where in the world your enterprise or government is located, such external and internal threats put your sensitive data at increasing risk. It could be cardholder information, […]

11 Mar
2013
Categories : Data Encryption, Data Protection, Data Security, Encryption Key Management            Leave a comment           

After talking with customers, prospects, partners, investors and other industry players at RSA Conference, Pacific Crest’s Emerging Technology Summit and AGC Partners’ Technology Growth Conference, it’s clear to me that the growing focus on data security is only going to intensify in the coming months. Data is the new currency, it has immense value, and everyone is fast coming to the realization that protecting it is no simple matter. As recent weeks have evidenced, the APT tornado is getting larger, gathering speed and becoming […]

Raising Standards at RSA 2013

Posted By: Vormetric
07 Mar
2013
Categories : Data Security            Leave a comment            Tags: , , ,

As Ashvin Kamaraju posted a few weeks ago, Vormetric is part of the OASIS international standards consortium, and a member of the Key Management Interoperability Protocol (KMIP) technical committee. The Thursday and Friday before RSA 2013, I participated in the KMIP face-to-face meeting. The following week, I spent much of my time at RSA in the OASIS KMIP booth demonstrating real vendor interoperability. I enjoyed both experiences so much I thought I’d share my thoughts here. As it was my […]

Taking Control of Your Cloud Data Security

Posted By: Andy Kicklighter, @akicklighter (Twitter)
05 Mar
2013
Categories : Data Security            Leave a comment            Tags: , , ,

A recent post from ITWorld reporting on the Cloud Security Alliance (CSA) Summit meeting last week at RSA pointed out several unsettling facts for organizations using cloud resources: There is no certification of, or transparency into, the security of a cloud offering Cloud providers’ first priority is to minimize the security impacts on themselves – customers take a back seat The chain of responsibility can be “clouded” – meaning your cloud application or infrastructure provider probably also uses additional resources […]

Security in Knowledge: A Roundup of RSA 2013

Posted By: Sol Cates, @solcates (Twitter)
28 Feb
2013
Categories : Big Data, Data Breach, Data Protection, Data Security, Key Management            Leave a comment           

RSA 2013 was another interesting round of innovations, progressions and revamps. I am always excited to see how the IS community is progressing and changing itself to meet the business and mission needs of its organizations. This year serves as a great example of how the industry is trying to play catch-up to these needs. The “vibe” is that we as professionals aren’t winning, but we haven’t lost yet, and I couldn’t agree more. The show’s theme is “Security in […]

Advanced Persistent Threat (APT): The Dragon Awakes

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
27 Feb
2013
Categories : Data Breach, Data Breach Disclosure, Data Protection, Data Security            Leave a comment           

The last year has seen a dramatic increase in the reports of attacks attributed to Advanced Persistent Threats, or APTs.  Earlier this month, though, the danger was made startlingly clear by the Mandiant APT1 report.  According to the report, “APT1 is a single organization of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006. From our observations, it is one of the most prolific cyber espionage groups in terms of the […]

Safe, Speedy Data at Rest: Vormetric & Fusion-io

Posted By: Christian Shrauder
26 Feb
2013
Categories : Encryption            Leave a comment           

Turning data into information in the shortest time possible enables our customers to make decisions that generate profit, and in some cases, protect our nation’s interest. Because of the value of these customers’ information, it is essential to protect it via encryption. Many of us are familiar with encrypting data in transit with SSL and other technologies to protect data in fight from compromise. Many customers are now finding it essential to encrypt data at rest or data stored on […]