Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

By Alan Kessler In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015 Insider Threat Report, the insider threat landscape is becoming more difficult to deal with as the range of miscreant’s moves beyond employees and privileged IT staff. It now includes outsiders who have stolen valid user credentials; business partners, suppliers, and contractors with inappr... (more)

Strata + Hadoop – Security in the Data Lake

About two weeks ago I attended the Strata + HADOOP world conference, February 2015, in San Jose.  I think the most notable observation from an IT perspective is that people are getting serious about it. The second is that the technology driving the HADOOP ecosystem is evolving at warp speed. ClickToTweet: Security in the Data Lake from Strata + Hadoop @AshvinKamaraju #DefenderOfData http://bit.ly/1FZjgkm One example for security – Cloudera now says that “Security is Foundational” and the new default. Cloudera also said that they created a data governance partnership with Intel an... (more)

Data Breaches & Five Stages of Grief By @Vormetric | @CloudExpo [#Cloud]

Data Breaches and the Five Stages of Grief: A Prediction for Next Year By Charles Goldberg I try to keep on top of the news, particularly as it relates to the nature and severity of cyber attacks taking place. Sadly, there’s been no shortage of reading material lately. Last month, there were reports on breaches at Kmart and Dairy Queen (my family loves Blizzards). Updates then came out about a massive breach at Home Depot. Then more recently, there’s been the spate of nation-state attacks on the USPS, National Oceanic and Atmospheric Administration (NOAA), Sony Entertainment and ... (more)

Full Disk Encryption Is Physical Security By @Vormetric | @CloudExpo [#Cloud]

Full Disk Encryption Is Physical Security, Not IT Security What threats are you trying to mitigate with full disk encryption? For a laptop that is moved around from office to home or out on a business trip full disk encryption should be standard. You need to protect that asset in the event of theft or loss of the device. It’s a great physical security. When properly implemented full disk encryption will render any information stored on that device useless. That’s great for a laptop, but what about your data center? ClickToTweet: Full Disk Encryption – Physical Security, Not IT Se... (more)

What the 2015 Vormetric Insider Threat Report Results Mean for Cloud Providers

We’ve just released our third annual Vormetric Insider Threat Report – Global Edition, and I thought I’d share with you a roll up of what I found most significant for cloud providers from the data. We’re especially happy with the results this year – polling was provided by Harris Poll, an especially strong global survey organization, with results from 818 IT Decision makers in both US and Global enterprises.  The author for the report is once again Ovum Analyst Andrew Kellett – an expert in global IT Security technologies and risks for enterprise customers. : In #2... (more)