Categories : Data Breach, Data Encryption            1Comments            Tags: , , , ,

It is the first day of Infosecurity Europe – Europe’s largest information security event that sees some 13,000 visitors from 70 different countries cross the tradeshow floor each year – and, it’s safe to say already that the Insider Threat is set to be one of the hottest talking points at this year’s show. This should come as little surprise since our recent report with Ovum into the scale of the problem across Europe that gave us an unsettling insight […]

Categories : Data Breach, Encryption            Leave a comment            Tags: , , ,

Organizations that have sensitive data have a perennial problem with using cloud resources …. Gaining the benefits of their use without exposing data that is required to be protected by compliance regimes, government data breach regulations or just because it is critical intellectual property. Click to Tweet: Protect high value data in AWS – @Vormetric teams with @AWSMarketplace in Security Software Free Trial amzn.to/QAhz95 If this is you, we’d really like you to “give our solution a spin” on Amazon […]

The Spending Gap – APTs and Insider Threats for Government

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
15 Apr
2014
Categories : Data Encryption, Data Security            Leave a comment            Tags: , , , ,

Just released is our latest Vormetric Insider Threat Report.  This latest report focuses on Europe, and an earlier version in September of last year detailed responses from the US.  Today, I’m taking a deeper look at the combined government data from both US and European government at a level you won’t see elsewhere. One point before I get to the results – Insider Threats aren’t just traditional insiders, people with access to sensitive data in the course of accounting, financial, […]

If you’re reading this blog, chances are good that you’ve heard of a horrid bug in OpenSSL named Heartbleed.  Rarely has a software bug caused such a ruckus in the security community.  The bug is sufficiently bad – an attacker can read random parts of the server’s memory – that an upgrade to the fixed version is an urgent matter.  To add to this, the versions of OpenSSL with the bug are very widely used – up to 2/3rds of […]

Categories : Data Security, Key Management            Leave a comment            Tags: , , , , , ,

While we’ve since learned it was a relatively unsophisticated attack, the Target data breach remains anchored in the headlines and, thanks to the more recent security breach reported at giant grocery chain Morrisons in the UK, we can’t get away from the risk posed to business by the ‘Insider Threat’. Events of the last few months have thrust the dangers of privileged user abuse into the spotlight. However, while these security incidents do vary in terms of scale and impact, […]

Cloud Security – Just build it in

Posted By: C.J Radford
20 Mar
2014

It isn’t any surprise that Cloud Security is still at the top of every Enterprise’s concerns about using cloud resources and services.  Since the inception of cloud services, security has been a top concern, and one of the reasons that the largest investments by enterprises to date have been private cloud related.  That hasn’t stopped lines of business from using cloud services without authorization, or stopped enterprises from putting their “toe in the water” with non-critical projects, limited SaaS applications […]

The U.S. Cybersecurity Framework

Posted By: Robert Bigman, Former CIA CISO
18 Mar
2014
Categories : Data Security            Leave a comment            Tags: , , , ,

Only Suggestions and Encouragement – When we are at Cyber War All you need to know about why the presidentially directed cybersecurity framework effort by the National Institute of Standards and Technology (NIST) represents (at best) minimal progress in our war against cybercriminals and nation-state actors is summed up in the second paragraph of the summary. The framework states that: “[i]t is the Policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and […]

We made a really important announcement today – We’ve now added integration to the third of the top SIEM solutions, IBM QRadar, to our existing integration with HP ArcSight and Splunk. As the cadence of data breaches increases worldwide with continued losses of credit card and customer data from retailers, health care data losses, revelations from Mr. Snowden, and more, it’s increasingly clear that traditional approaches to security are not able to safeguard sensitive data. What’s needed are strong security […]

Forecast: Cloudy With a Chance of Encryption

Posted By: Alan Kessler, @kessalan
07 Mar
2014
Categories : Data Encryption            Leave a comment            Tags: , , , ,

Guest authored by Tom Evgey, Sr. Security Analyst at Virtustream The RSA conference in San Francisco, CA, is certainly one, if not the largest network security conferences in the world. Rows upon rows of vendors attend showcasing the latest and hottest tools and services in the industry in an effort to convince you to buy their ultimate solution for protecting your closest assets.  Buzz-words like SIEM integration, log correlation, cloud security and forensic analysis were on almost every flyer; long […]

06 Mar
2014

As if all our RSA Conference 2014 news wasn’t enough to keep you busy, we now have even more exciting news to share.  Vormetric has been shortlisted for THREE awards at the SC Magazine Europe awards. First up, Vormetric Encryption has been shortlisted in two product categories – Best Encryption Solution AND Best Cloud Computing Security Solution – in this year’s awards. We’re delighted that our solution is a contender in both these categories. With constant tales of cyber-attacks and […]