Data Security Along Every Stage of the Journey

Let’s say you’re planning a train robbery in the Old West. Your posse can jump on board at the station, on the route or at the last stop. The same is true of today’s data robbers. There are three main states in which data exists across an enterprise: at rest, in motion and in use. As […]

The post Data Security Along Every Stage of the Journey appeared first on Security Intelligence.

Continue reading Data Security Along Every Stage of the Journey

Cloud Security: Why Being Intentional in Encryption Matters

Cloud security and web application security demand technology and practices that protect applications and data hosted remotely. Good old-fashioned data encryption is chief among these. The reasons for encrypting cloud data, of course, are privacy, security and regulatory compliance — all standard for any successful enterprise. At the bottom of all this is the idea […]

The post Cloud Security: Why Being Intentional in Encryption Matters appeared first on Security Intelligence.

Continue reading Cloud Security: Why Being Intentional in Encryption Matters

Evolution of JSWorm ransomware

There are times when a single ransomware family has evolved from a mass-scale operation to a highly targeted threat – all in the span of two years. In this post we want to talk about one of those families, named JSWorm. Continue reading Evolution of JSWorm ransomware

Evolution of JSWorm ransomware

There are times when a single ransomware family has evolved from a mass-scale operation to a highly targeted threat – all in the span of two years. In this post we want to talk about one of those families, named JSWorm. Continue reading Evolution of JSWorm ransomware

The Security Industry is Protecting the Wrong Thing

When the security industry talks about a data breach, often the first question asked involves the state of the victim’s network security – not the breach of data. Why is this? It’s because organizations have their security priorities… Continue reading The Security Industry is Protecting the Wrong Thing

Zettaset Unveils Encryption Management Console

Zettaset today added a management console to its portfolio that promises to simplify managing encryption on an end-to-end basis via integrations with third-party key managers that comply with the key management interoperability protocol (KMIP). KMIP d… Continue reading Zettaset Unveils Encryption Management Console

Role of Encryption in GDPR Compliance

Encryption has been a hot topic of discussion during the implementation phase of most data privacy laws. In the age where organizations are dealing with large volumes of data each day, the protection of this sensitive data is critical. The data, which … Continue reading Role of Encryption in GDPR Compliance

3 Foundations of a Data Security Strategy

Data is one of the most important assets your organization has, and protecting it is no longer optional. Cyberattacks can come in multiple forms, including outsider attacks such as phishing or malware, as well as insider threats via social engineering… Continue reading 3 Foundations of a Data Security Strategy

Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy

They come in the mail — ominous-looking envelopes that are devoid of branding and obvious marketing embellishments. Plain white, marked with often-unrecognizable return addresses, and relatively thin — the contents of which will spoil your day and cause you to lose yet a bit more faith in humanity. No, it’s not a tax bill; rather, […]

The post Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy appeared first on Security Intelligence.

Continue reading Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy

Simplify Data Encryption With Key Management

Many people already know data encryption can help secure sensitive business data. But, because organizations have adopted it so widely, IT and security teams now must manage growing numbers and types of encryption keys. Each key may belong to a different data storage device with built-in data encryption and database management systems. Others may belong to […]

The post Simplify Data Encryption With Key Management appeared first on Security Intelligence.

Continue reading Simplify Data Encryption With Key Management