Categories : Big Data            Leave a comment           

Recently, IDC announced its market forecast for the growth of the Big Data technology and services market for 2012–2016. A key finding of the report forecasts that the Big Data market will grow at a 31.7 per cent compound annual growth rate; comparable in scale to about seven times the growth rate of the entire information and communication technology (ICT) market worldwide, and is expected to attain revenues of $23.8 Billion in 2016 Businesses are embracing the opportunity to leverage […]

04 Dec
Categories : PCI DSS            Leave a comment            Tags: ,

In our last post entitled PCI DSS: The Basics, we provided a very high-level overview of the Payment Card Industry Data Security Standard. But knowing what the standard contains is a far cry from understanding how to implement solutions in such ways to create a compliant cardholder data environment. In this post, you will see a number of case studies that illustrate how Vormetric can be used to support PCI DSS compliance. Case Study – TAB Bank PCI DSS is […]

PCI DSS: The Basics

Posted By: Tina Stewart, @socialTIS
03 Dec
Categories : PCI DSS            Leave a comment            Tags: ,

The Payment Card Industry Data Security Standard, PCI DSS, remains one of the most challenging regulations with which companies must comply. Its Janus-faced qualities (some say it’s too prescriptive, while others complain that the standards are confusingly vague) make achieving and managing compliance difficult and time-consuming. The PCI DSS requires that all companies that store, process, or transmit cardholder data must comply with the standard. The standard consists of twelve top-level requirements, each with a series of sub-requirements that detail […]

Categories : Data Protection, Encryption, Key Management            Leave a comment           

The Institute of Electrical and Electronics Engineers (IEEE), one of the leading standards-making organisations, suffered the consequences of some sub-par data security practices this week as it emerged that 100,000 member usernames and passwords were found in plain text on a FTP server. A (luckily) well-intentioned researcher demonstrated that, once again, the need for better data protection measures at the server level had failed to be addressed. This incident in particular displayed two significant issues: firstly the IEEE didn’t consider […]

Categories : Data Encryption, Data Protection, HIPAA, HITECH            Leave a comment           

As I see the seemingly endless reports of breaches it does seem obvious that progress in the protection of healthcare still lags. HIPAA HITECH certainly have spurred some action, but it’s obvious that the protection tactics aren’t sufficient to protect against the data thieves and hackers. And for the most part, the industry has begun moving towards more robust data protection strategies, as opposed to implementing point solutions. But the numbers mentioned by Office of Civil Rights at HHS, 50,000 […]

Categories : Data Protection, Data Security            Leave a comment           

I recently read a Mandiant research report indicates that Hikit, a backdoor Trojan, has targeted a number of smaller defense contractors for the purpose of conducting industrial espionage. This latest series of attacks highlights the difficulty that many companies face in protecting sensitive data. As we continue to focus on building higher and higher perimeter fences to keep the bad guys out, we often lose sight of what’s behind that fence – the data. What’s more, companies often focus their […]

Portable Security: Data Protection in the Cloud

Posted By: Tina Stewart, @socialTIS
06 Aug
Categories : Cloud Computing, Data Protection, Data Security            Leave a comment           

Cloud computing has changed the way that companies do business. The ability to leverage economies of scale have allowed businesses to stretch scarce resources – the old “do more with less” mandate with which companies, and particularly IT departments, are often hit during tight economic times. But while private clouds can make it easier for organizations to build availability and scale resources, it can also make data protection in the cloud more complex. A recent article in Datamation titled “Private […]

Categories : Data Breach, Encryption            Leave a comment           

It’s now a week since web giant Yahoo suffered a reported breach of its systems. Whilst the company has remained tight lipped over the event, several sources cited hacking collective D33D as the perpetrators of the incident and stated that an SQL injection attack opened access to close to half a million unencrypted user passwords from a Yahoo web database. The very fact is, this isn’t the first large brand that we’ve seen fall victim to a security breach, and […]

An Ounce of Prevention is worth a Pound of Cure

Posted By: Tina Stewart, @socialTIS
14 May
Categories : Data Encryption, HIPAA, HITECH, Key Management            Leave a comment           

The recent Blue Cross Blue Shield Data Breach highlights an often overlooked risk to data; that of recycled, or unused hardware which is in storage. In the BCBS example, 57 hard drives were stolen from a secure locker at a former call center location. The theft was not believed to have targeted the data but rather was the result of a burglar looking for hardware to steal and resell. Unfortunately for Blue Cross Blue Shield, the result was the same. […]