Breakthrough Encryption Performance with Vormetric, Intel AES NI and MongoDB
Intel’s AES-NI instructions are extensions to the x86 instruction set to perform AES encryption and decryption directly using Intel CPUs. In addition to being more secure, there are significant...
View ArticleThe Buzz before CSA Congress and Privacy Academy 2014
I’m pretty excited about the CSA Congress and IAPP Privacy Academy in San Jose this week. Although some half-day pre-conference workshops were on the docket for today, for us, the event formally...
View ArticleAnother Retailer Bites the ‘Data Security’ Dust
Personal note: When I initially laid out this blog, I planned on stepping through recent revelations in the Dairy Queen breach. However, since my initial outline, Kmart was also breached. These...
View ArticleThe Twin Drivers to Reprioritize IT Security Spending Now
A bit over a week ago some of our senior executives were in New York for a CSO summit. Our own CSO (Sol Cates) and CEO (Alan Kessler) were among those attending. One observation from the summit – this...
View ArticleWhy a Data Security Platform Should be a Priority for Your Enterprise
When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact...
View ArticleData Breach Explosions – Boom Clap – The Breach Goes On and On and On and On and
The state of security and data breaches is no song and dance matter. We all know 2014 wasn’t shy of data breaches. We saw companies – once thought of as impenetrable – hacked. In this layout of the...
View ArticleEncryption is the Gateway Drug – Announcing the Vormetric Cloud Encryption...
When it comes to SaaS security concerns, cloud storage tops the list. In fact, 83 percent of U.S., and 72 percent of global respondents were very or extremely concerned about the protection of...
View ArticleSecurity Level Agreements – A required element of any SLA
Service Level Agreements (SLAs) directly involve continuous effort and improvement, significant technical investments and integration; and whether implied or explicit all business have them. Once an...
View ArticleBrexit: In this climate of uncertainty, Cybercrime remains constant
In the wake of the UK’s recent decision to opt out of the EU, many UK businesses are facing a period of uncertainty. With the decrease in the value of the pound and fears over a widening IT skills gap,...
View ArticleReducing the Risk of Data Breaches for U.S. Federal Organizations
Einstein’s definition of insanity is doing the same thing over and over again and expecting different results. And if Einstein said it, it must be true, right? Using this definition, I would argue that...
View Article
More Pages to Explore .....