Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

IoT – Enterprise-Ready Policies for Personal Data Required By Andy Kicklighter Given the current global furor over continuing data breaches, Edward Snowden disclosures, the hue and cry around NSA data collection from mobile phones and mobile encryption, now is a good time to stop and think before we plunge wholesale into even more extensive collection of personal information from IoT environments and devices. Think how much worse a breach of data could be if it includes full profiles of people’s movements, actions, eating habits, purchase preferences or even more personal information.  Consider at the same time the potentials for abuse if this information is improperly handled or made available. ClickToTweet: IoT – The need for enterprise ready personal data policies @akicklighter #DefenderOfData http://bit.ly/1CvgRPR It seems inevitable that legislation will lag our... (more)

A Guide to the CIO’s Toolbox By @Vormetric | @CloudExpo [#Cloud]

By Alan Kessler In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015... (more)

Internet of Things Drives Stronger Security for Big Data By @Vormetric | @ThingsExpo [#IoT]

IoT Drives Stronger Security for Big Data Environments By Ashvin Kamaraju The slogan “Internet of Things (IoT) X Big Data = Unprecedented Value!” caught my attention as I was listening to a presentation from Intel Corporation. The scale of the IoT disruption was described in terms of things, data and value: 50 billion devices are expected to connect to the Internet by 2016. As recently as 2013 this was 0.5 Billion These devices will generate 35 Zetabytes of data! And can create an estimated value of $2 to $6 trillion in global economic impact. Now that is huge by any measure! ... (more)

The New War on Cyberattacks By @Vormetric | @CloudExpo [#Cloud]

The New War on Cyberattacks By Alan Kessler The Current Policy Landscape When it comes to cybersecurity initiatives, the U.S. government has not taken a back seat. Perhaps owning to the number of high profile breaches and damaging insider attacks that have occurred in the past few years, this White House in particular has been very vocal about the federal government’s role in putting a stop to cyberattacks. Recent examples of this include Obama’s visit to Stanford University to put meet with CEOs and CSOs at major companies and discuss cybersecurity challenges, the establishmen... (more)

Insider Security Threats By @Vormetric | @CloudExpo [#Cloud]

What We Talk About When We Talk About Insider Threats What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions. But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be considered the “insider threat” poster child, not all employees have malicious intentions. In fact, it’s likely the vast majority of your employees have comp... (more)