21 Feb
2013
Categories : Data Security            Leave a comment           

The alarming growth in the number of data beaches, the need to comply with data governance regulations, and the migration of sensitive data to the cloud underscores the need to protect sensitive data. Data protection boils down to building a firewall around your data: define who has access to the data and encrypt that data. Unfortunately, many products that accomplish this manage the keys used for encryption in a closed, non-interoperable system. In an effort to improve interoperability, last week, […]

Categories : Cloud Computing, Data Security            Leave a comment           

When organizations build products, not just security products, they do so with a user interface that ultimately sets the tone for the overall user experience. This can range from very positive (if the organization takes an Apple-like approach to user interfaces) all the way to negative for products where the common use cases aren’t thought through well enough. As customers and partners begin to realize the value of a product or service, one question that usually comes up is whether […]

Insider Threats: A Big Concern for CISOs

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
14 Feb
2013
Categories : Data Security            Leave a comment           

Many people think that all data breaches occur when outside thieves get into an organization’s systems. Not so. The fact of the matter is insider threats are rising dramatically, in both the business world and government circles. According to InformationWeek Reports 2012 Strategic Security Survey, 52% of those surveyed identified insiders as the top security threat at their organization. To address this growing issue, the Administration sent out a presidential memorandum in November to the heads of all executive departments […]

Categories : Data Security            Leave a comment           

If you want to understand the legal requirements for encryption in Europe and Asia, Stewart Room has the answer for you. Stewart, a partner and IT security specialist with Field Fisher Waterhouse LLP, today published the findings of research his team conducted into the legal requirements for encryption of personal data in Europe and Asia. The paper examines the legal obligation to encrypt personal data in both Europe – with particular focus on the United Kingdom, France, Germany and Spain, […]

Data Breach Lowlights 2012 — Part 2

Posted By: Tina Stewart, @socialTIS
07 Feb
2013
Categories : Data Protection            Leave a comment           

Paring down the contenders for this blog post series has been no easy task. It was not, as they say, a banner year for data protection. However, by taking a good hard look what happened to others, we can learn important lessons about how to apply advanced data protection strategies before a crisis hits. In this post, we’ll review what happened to Yahoo! last summer. Last June, Yahoo announced that its voice platform had been compromised using a relatively basic […]

The Cloud Looms Large: Data Protection on the Move

Posted By: derektumulak, @tumulak
05 Feb
2013
Categories : Data Security            Leave a comment           

As we enter every new year, a raft of “what’s in store” articles predicting the major issues and opportunities emerge on the scene. This year, it seems that the cloud (and specifically, cloud security) is one of the major areas of focus for companies. According to Global State of Information Security® Survey 2013 — a worldwide study conducted by PwC, CIO Magazine, and CSO Magazine — cloud security is the #1 technology security priority for the North American organizations polled. […]

Note To Self: Perimeter Protection is Passé

Posted By: Tina Stewart, @socialTIS
31 Jan
2013
Categories : Data Security            Leave a comment           

Today’s news from the New York Times that Chinese hackers had attacked the New York Times network over the last four months is a reminder of the inadequacy of perimeter defenses by themselves. The folks at Mandiant helped the NYTimes to figure this out – those guys rock! As the article points out, the hackers are exceptionally sophisticated in their methods of penetrating the network. The hackers installed 45 pieces of malware over three months, and Symantec (the NYTimes uses […]

31 Jan
2013
Categories : Data Breach, Data Protection            Leave a comment           

I thought it would be a quick and interesting exercise to look at 2012’s “worst of the worst” in data protection. As I started researching for my blog post, however, the sheer number of contenders for this dubious honor was nothing short of sobering. Hardly a week went by in 2012 without some sort of major data security breach in the news. (In fact, I started having flashbacks to some of those great  iconic movie scenes in Dr. Strangelove, Mission: Impossible, The Running Man, and Superbad.  “There’s been a security breach…”) While I had literally dozens of examples to choose from, I thought in this post I’d take a look […]

Data Security: Protect What Matters

Posted By: Alan Kessler, @kessalan
29 Jan
2013
Categories : Cloud Computing, Data Breach, Data Protection, Data Security            Leave a comment           

Over the past three months, I’ve had dozens of interesting conversations with Vormetric customers about how their data security strategies are changing as the result of business mandates around things like cloud adoption and big data. From those interactions, two things became crystal clear to me: first, it’s a whole new era in data security that makes perimeter security far less relevant, and second, enterprises are laser focused on making sure they ‘protect what matters,’ anywhere it happens to reside, […]

Categories : Big Data            Leave a comment           

Recently, IDC announced its market forecast for the growth of the Big Data technology and services market for 2012–2016. A key finding of the report forecasts that the Big Data market will grow at a 31.7 per cent compound annual growth rate; comparable in scale to about seven times the growth rate of the entire information and communication technology (ICT) market worldwide, and is expected to attain revenues of $23.8 Billion in 2016 Businesses are embracing the opportunity to leverage […]