Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

The New War on Cyberattacks By Alan Kessler The Current Policy Landscape When it comes to cybersecurity initiatives, the U.S. government has not taken a back seat. Perhaps owning to the number of high profile breaches and damaging insider attacks that have occurred in the past few years, this White House in particular has been very vocal about the federal government’s role in putting a stop to cyberattacks. Recent examples of this include Obama’s visit to Stanford University to put meet with CEOs and CSOs at major companies and discuss cybersecurity challenges, the establishment of a cybersecurity center to collect cybersecurity intelligence and the signing of an executive order to promote information sharing. In January, Congress also kicked off hearings about a national breach notification law; the law’s tenants would, in most cases, mandate breach notification ... (more)

Ski Helmets, Seat Belts, and Encryption By @Chvrles | @CloudExpo #Cloud

What Do Ski Helmets, Seat Belts, and Encryption Have in Common? By Charles Goldberg Ski helmets, seat belts, and encryption. What comes to your mind when you read these words? You may immediately think “safety,” and you’d be right, but how about “speed enablers”? At first blush, that may not be the first concept that comes to mind, but there’s a pretty compelling case to be made for this as another common theme. Let me give you a couple fun examples, starting with ski helmets. During the winter of 2002/2003 researchers studied different factors, and how they affect skier and sno... (more)

Insider Security Threats By @Vormetric | @CloudExpo [#Cloud]

What We Talk About When We Talk About Insider Threats What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions. But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be considered the “insider threat” poster child, not all employees have malicious intentions. In fact, it’s likely the vast majority of your employees have comp... (more)

Full Disk Encryption Is Physical Security By @Vormetric | @CloudExpo [#Cloud]

Full Disk Encryption Is Physical Security, Not IT Security What threats are you trying to mitigate with full disk encryption? For a laptop that is moved around from office to home or out on a business trip full disk encryption should be standard. You need to protect that asset in the event of theft or loss of the device. It’s a great physical security. When properly implemented full disk encryption will render any information stored on that device useless. That’s great for a laptop, but what about your data center? ClickToTweet: Full Disk Encryption – Physical Security, Not IT Se... (more)

What the 2015 Vormetric Insider Threat Report Results Mean for Cloud Providers

We’ve just released our third annual Vormetric Insider Threat Report – Global Edition, and I thought I’d share with you a roll up of what I found most significant for cloud providers from the data. We’re especially happy with the results this year – polling was provided by Harris Poll, an especially strong global survey organization, with results from 818 IT Decision makers in both US and Global enterprises.  The author for the report is once again Ovum Analyst Andrew Kellett – an expert in global IT Security technologies and risks for enterprise customers. : In #2... (more)