The Long Game of “Encrypt Everything”

Posted By: Alan Kessler, @kessalan
06 Oct
2014

Data encryption is increasingly at the forefront of American conversations around cybersecurity. In fact, Fusion’s Daniel Rivero, citing government intrusion and overreach, went so far as to call it “the second amendment battle for the digital age.” Given October is National Cyber Security Awareness Month, it only seems appropriate to explore the benefits of encryption – a strategy that helps keep businesses accountable to their customers, partners, employees and stock holders. Click to Tweet: The Long Game of Encrypt Everything […]

Categories : Cloud Security, Encryption            Leave a comment            Tags: , , , , ,

We passed a great milestone this week – our second Cloud marketplace implementation for Vormetric Transparent Encryption as we added support for IBM Cloud Marketplace to our existing AWS Marketplace offering. If you are an enterprise looking to take advantage of the flexibility, cost savings and business agility that comes with using cloud-based resources, we already know something that’s been at the top of your list – How can I safely use sensitive data and take advantage of these resources […]

Categories : Data Breach, Encryption            Leave a comment            Tags: , , ,

Organizations that have sensitive data have a perennial problem with using cloud resources …. Gaining the benefits of their use without exposing data that is required to be protected by compliance regimes, government data breach regulations or just because it is critical intellectual property. Click to Tweet: Protect high value data in AWS – @Vormetric teams with @AWSMarketplace in Security Software Free Trial amzn.to/QAhz95 If this is you, we’d really like you to “give our solution a spin” on Amazon […]

If you’re reading this blog, chances are good that you’ve heard of a horrid bug in OpenSSL named Heartbleed.  Rarely has a software bug caused such a ruckus in the security community.  The bug is sufficiently bad – an attacker can read random parts of the server’s memory – that an upgrade to the fixed version is an urgent matter.  To add to this, the versions of OpenSSL with the bug are very widely used – up to 2/3rds of […]

Cloud Security – Just build it in

Posted By: C.J Radford
20 Mar
2014

It isn’t any surprise that Cloud Security is still at the top of every Enterprise’s concerns about using cloud resources and services.  Since the inception of cloud services, security has been a top concern, and one of the reasons that the largest investments by enterprises to date have been private cloud related.  That hasn’t stopped lines of business from using cloud services without authorization, or stopped enterprises from putting their “toe in the water” with non-critical projects, limited SaaS applications […]

The U.S. Cybersecurity Framework

Posted By: Robert Bigman, Former CIA CISO
18 Mar
2014
Categories : Data Security            Leave a comment            Tags: , , , ,

Only Suggestions and Encouragement – When we are at Cyber War All you need to know about why the presidentially directed cybersecurity framework effort by the National Institute of Standards and Technology (NIST) represents (at best) minimal progress in our war against cybercriminals and nation-state actors is summed up in the second paragraph of the summary. The framework states that: “[i]t is the Policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and […]

We made a really important announcement today – We’ve now added integration to the third of the top SIEM solutions, IBM QRadar, to our existing integration with HP ArcSight and Splunk. As the cadence of data breaches increases worldwide with continued losses of credit card and customer data from retailers, health care data losses, revelations from Mr. Snowden, and more, it’s increasingly clear that traditional approaches to security are not able to safeguard sensitive data. What’s needed are strong security […]

06 Mar
2014

As if all our RSA Conference 2014 news wasn’t enough to keep you busy, we now have even more exciting news to share.  Vormetric has been shortlisted for THREE awards at the SC Magazine Europe awards. First up, Vormetric Encryption has been shortlisted in two product categories – Best Encryption Solution AND Best Cloud Computing Security Solution – in this year’s awards. We’re delighted that our solution is a contender in both these categories. With constant tales of cyber-attacks and […]

The Currency of Convenience

Posted By: Alan Kessler, @kessalan
05 Mar
2014
Categories : Data Encryption, Data Security, Encryption            Leave a comment            Tags: , , , ,

There’s no better place to gauge the state of the security industry than the RSA Conference. At this year’s event, the Vormetric team had a chance to touch base with our fellow industry professionals, chat with analysts and the media, and discuss some of the top-of-mind events that have security professionals buzzing. It was time well-spent and once again a fantastic experience. Chief among those buzzworthy items is a recent piece from Bloomberg’s Chris Strohm, in which former NSA cybersecurity […]

Report from the Trenches of RSA 2014

Posted By: Alan Kessler, @kessalan
27 Feb
2014
Categories : Data Encryption, Encryption            Leave a comment            Tags: , , , , ,

Guest authored by Pete Nicoletti, CISO at Virtustream The planet’s smartest security minds have descended by the thousands on the Moscone Center here in San Francisco desperately searching for their personal holy grail. They are looking through the myriad of security related things: the next generation of something; a hot new startup that could be worth billions; new tools and stuff that is cheaper, better, faster; a new market segment, built on big data and, of course, it must be […]