My Cybersecurity “Ah-ha” Moment

Posted By: Alan Kessler, @kessalan
06 Oct
2016
Categories : Data Security            Leave a comment            Tags: , , , ,

As some of you may be aware, October is National Cybersecurity Awareness Month.  The theme for this week, specifically, is STOP. THINK. CONNECT: The Basic Steps to Online Safety and Security. Part of this week’s focus includes examining “cybersecurity jobs and how to engage young people in pursuing careers devoted to protecting the Internet.” The weekly topic, and the entire month’s devotion to cybersecurity, compels me to consider my cybersecurity “ah-ha” moment (We’re talking pre-Edward Snowden; pre-cybersecurity “skills gap”; pre-Target). […]

Yesterday, we announced the general availability of Vormetric Data Security Release 5, Version 5.2.1.  This is a full release for our set of Data Security Platform products, including extensive enhancements to our flagship Vormetric Transparent Encryption product, our new Vormetric Application Encryption offering, updates to our Data Security Manager appliance, encryption agents, key management and more.  The release is the culmination of significant work by Vormetric product development, product management and product marketing teams and further extends our platform to […]

General Availability of Application Encryption

Posted By: derektumulak, @tumulak
29 May
2014
Categories : Application Encryption, Data Encryption, Database Encryption, Encryption, Key Management            1Comments            Tags: ,

The Vormetric Data Security Platform Yesterday was a big day for Vormetric, the culmination of the long process of creating a new product – Vormetric Application Encryption.  This offering is a major extension of our Data Security Platform, giving our customers powerful capabilities for granularly encrypting field, column and file data within enterprise and web applications, as well as cloud and big data environments. With the addition of Vormetric Application Encryption to the Vormetric Data Protection Platform, we have created […]

Categories : Cloud Security, Encryption            Leave a comment            Tags: , , , , ,

We passed a great milestone this week – our second Cloud marketplace implementation for Vormetric Transparent Encryption as we added support for IBM Cloud Marketplace to our existing AWS Marketplace offering. If you are an enterprise looking to take advantage of the flexibility, cost savings and business agility that comes with using cloud-based resources, we already know something that’s been at the top of your list – How can I safely use sensitive data and take advantage of these resources […]

Categories : Data Breach, Data Encryption            1Comments            Tags: , , , ,

It is the first day of Infosecurity Europe – Europe’s largest information security event that sees some 13,000 visitors from 70 different countries cross the tradeshow floor each year – and, it’s safe to say already that the Insider Threat is set to be one of the hottest talking points at this year’s show. This should come as little surprise since our recent report with Ovum into the scale of the problem across Europe that gave us an unsettling insight […]

The Spending Gap – APTs and Insider Threats for Government

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
15 Apr
2014
Categories : Data Encryption, Data Security            Leave a comment            Tags: , , , ,

Just released is our latest Vormetric Insider Threat Report.  This latest report focuses on Europe, and an earlier version in September of last year detailed responses from the US.  Today, I’m taking a deeper look at the combined government data from both US and European government at a level you won’t see elsewhere. One point before I get to the results – Insider Threats aren’t just traditional insiders, people with access to sensitive data in the course of accounting, financial, […]

If you’re reading this blog, chances are good that you’ve heard of a horrid bug in OpenSSL named Heartbleed.  Rarely has a software bug caused such a ruckus in the security community.  The bug is sufficiently bad – an attacker can read random parts of the server’s memory – that an upgrade to the fixed version is an urgent matter.  To add to this, the versions of OpenSSL with the bug are very widely used – up to 2/3rds of […]

The U.S. Cybersecurity Framework

Posted By: Robert Bigman, Former CIA CISO
18 Mar
2014
Categories : Data Security            Leave a comment            Tags: , , , ,

Only Suggestions and Encouragement – When we are at Cyber War All you need to know about why the presidentially directed cybersecurity framework effort by the National Institute of Standards and Technology (NIST) represents (at best) minimal progress in our war against cybercriminals and nation-state actors is summed up in the second paragraph of the summary. The framework states that: “[i]t is the Policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and […]

We made a really important announcement today – We’ve now added integration to the third of the top SIEM solutions, IBM QRadar, to our existing integration with HP ArcSight and Splunk. As the cadence of data breaches increases worldwide with continued losses of credit card and customer data from retailers, health care data losses, revelations from Mr. Snowden, and more, it’s increasingly clear that traditional approaches to security are not able to safeguard sensitive data. What’s needed are strong security […]

The Currency of Convenience

Posted By: Alan Kessler, @kessalan
05 Mar
2014
Categories : Data Encryption, Data Security, Encryption            Leave a comment            Tags: , , , ,

There’s no better place to gauge the state of the security industry than the RSA Conference. At this year’s event, the Vormetric team had a chance to touch base with our fellow industry professionals, chat with analysts and the media, and discuss some of the top-of-mind events that have security professionals buzzing. It was time well-spent and once again a fantastic experience. Chief among those buzzworthy items is a recent piece from Bloomberg’s Chris Strohm, in which former NSA cybersecurity […]