Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

It's all ‘Bout That Access, ‘Bout That Access, ‘Bout That Access - 2015 Insider Threat Report Takeaways While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking alongside using physical force. Today we issued our 2015 Vormetric Insider Threat report. Coming off of the Sony breach and Obama’s State of the Union address, we can’t think of a better time to deliver a report that provides so much insight into where the cyber security industry stands. Here’s one stat that really stands out: Despite this unsettling news, results from our 2015 Vormetric Insider Threat Report show that insider threat awareness levels have increased: 55% of responden... (more)

What does tokenization mean for our European customers?

You may have seen the recent blog post from Charles Goldberg, which provides an overview of tokenization and our new product offering in this area.  Here in the UK and Europe, we’re seeing specific demand for these capabilities around three key areas, which I’d like to highlight here. : Euro and UK Applications for Tokenisation and Data Masking from @Vormetric http://bit.ly/1KH4mR5 PCI DSS If an organisation has any need to handle payment card details, it must adhere to PCI compliance guidelines.  Although in many regards Europe is at the cutting edge of card secur... (more)

The New War on Cyberattacks By @Vormetric | @CloudExpo [#Cloud]

The New War on Cyberattacks By Alan Kessler The Current Policy Landscape When it comes to cybersecurity initiatives, the U.S. government has not taken a back seat. Perhaps owning to the number of high profile breaches and damaging insider attacks that have occurred in the past few years, this White House in particular has been very vocal about the federal government’s role in putting a stop to cyberattacks. Recent examples of this include Obama’s visit to Stanford University to put meet with CEOs and CSOs at major companies and discuss cybersecurity challenges, the establishmen... (more)

Internet of Things Policies Required By @Vormetric | @ThingsExpo [#IoT]

IoT – Enterprise-Ready Policies for Personal Data Required By Andy Kicklighter Given the current global furor over continuing data breaches, Edward Snowden disclosures, the hue and cry around NSA data collection from mobile phones and mobile encryption, now is a good time to stop and think before we plunge wholesale into even more extensive collection of personal information from IoT environments and devices. Think how much worse a breach of data could be if it includes full profiles of people’s movements, actions, eating habits, purchase preferences or even more personal inform... (more)

Getting Data Security Right By @KessAlan | @CloudExpo #Cloud

Getting Data Security Right: Healthcare, Retail, Financial Services and Government By Alan Kessler It seems like every time I write a blog, a new breach has occurred (for an up-to-date look at local, state and federal breaches I suggest you periodically review the Identity Theft Resource Center’s running list). Since I last penned a post, we’ve seen breaches of the Mayo Clinic, Citizen’s Bank, CVS and Arkansas BlueCross/BlueShield. To the average person, most breaches probably bleed together. If you’ve seen one breach, you’ve seen them all, right? If we’re going off of that logi... (more)