Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Vormetric Blog
Filming a Satire : Filming a Satire The objective of this project is to give students a greater understanding of what satire is and how it works. (Teacher assignments necessary depending on who has access to video cameras. The end product should be 5 6 minutes long, so the script shoul...
Examples of Setting Goals in Sports Setting goals is a powerful motivator in sports performance. Goals give individual players and sports teams targets and numbers to strive for, and they can also be used as a measuring stick to monitor progress. Goals should be agreed upon between a c...
Atofina Chemicals Selects Digex For Managed Hosting Atofina Chemicals manufactures thousands of polymers, resins and chemicalsfor many different markets throughout the world. In order to expedite theorder process for vendors and customers, the company has created an onlineorder entry s...
Connectria Hosting Offer HIPAA Almost 10 years after the HIPAA security rules were first implemented a couple of hosting providers have made announcements this week around their hosting and cloud services tailored to healthcare organizations. The announcements are also particularly tim...
BlueStar Expands SAP Disaster Recovery Services These expandedofferings are in response to customers requesting more comprehensivesolutions following the Sept. 11 terrorist attacks. BlueStar Solutions offers thesenew services to its SAP hosting customers and as well as to companies who...
Climate Weather in India The Indian Meteorological Service divides the year into four seasons: a cool and dry winter from December to February, a hot and dry summer from March to May, monsoon season from June to September and a retreating monsoon season in October and November. which e...
Last week I had the pleasure of attending AWS re:Invent, Amazon Web Services’ global customer and partner conference in Las Vegas. Overall the conference was characterized by a very entrepreneurial spirit, full of inventive individuals. With nearly 20,000 cloud fans in Vegas, it was bo...
While protecting data in the cloud can seem like a daunting task, now more than ever enterprises are rising up to the task to defend data while keeping systems compliant. This month marks the anniversary of ISO 27018, a globally recognized standard that details a strong set of controls...
The idea behind initiatives like ‘National Cyber Security Awareness Month’ in the US and the on-going campaign in the UK of ‘Get Safe Online’ – is that each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. People, finances, devices a...
With the start of October come thoughts of Halloween (at least if you live in the U.S.), fall colors and a real change of season – as well as the start of National Cybersecurity Awareness Month for the U.S.  Much of this month’s focus will be on personal awareness and activ...
For this eleventh National Cybersecurity Awareness Month – a time when we’ve most often focused on making people aware of the need for awareness and personal best practices for being safe online – it’s important not to lose sight of how to best implement enhanced cybersecurity for orga...
By generating real-time insights, analytics is changing how we conduct business. Providing a fast and adaptable platform for real-time business, SAP HANA is a clear leader. The magnitude of the SAP ecosystem and the number of enterprise customers that depend on SAP to run their busines...
As chief security officers (CSOs), you know that keeping data security is a critical component to your job. My colleague CJ Radford recently summed up our role as follows: when data is inside your four walls, you put trust in your own employees, the infrastructure and security solution...
Service Level Agreements (SLAs) directly involve continuous effort and improvement, significant technical investments and integration; and whether implied or explicit all business have them. Once an organization is consistently meeting their SLAs, the tolerance for change decreases and...
There’s an old 70’s protest tune recorded by the Temptations and written by Edwin Star that goes “War. Huh. What is it good for?  Absolutely nothin’!”.  This is not quite true when you substitute full disk encryption (FDE) for “War” when it com...
Cloud computing has changed the way organizations approach IT by increasing agility, introducing new business models, providing more services and reducing costs. With so many obvious benefits, cloud and SaaS adoption is on the rise. In fact, according to the 2015 Vormetric Insider Thre...
Once upon a time, cybersecurity was rarely discussed and we paid mild attention to the content we shared online. However, large scale breaches like those at Target, Anthem and Home Depot opened Americans’ eyes to the information we release in the cyber world – even Obama spoke to the n...
Today, we issued our final installment of the 2015 Vormetric Insider Threat report – Adding results from Mexico and Brazil to our already release results from the U.S., U.K., Germany, Japan and the ASEAN region.  As usual we learned some things that we really weren’t expect...
We are able to access our data from nearly anywhere in the world, and this an incredible business resource, but this has increased the risk of data being compromised by malicious parties. Now, with data held in the cloud, in data warehouses or being exchanged over multiple enterprise s...
If you’re running a business, there’s a good chance you’re focused on reaching certain end goals. Two of those goals likely include both velocity and profitability. The Oxford Dictionary defines velocity as “the speed of something in a given direction” and profitability as “the degree ...
It’s been said that those who don’t learn from history are doomed to repeat it. In my last article, I wrote metaphorically about the medieval arms race to protect the pot of gold inside the castle from outside intruders. This time I want to draw upon history as the telescopic lens thro...
Today, I wanted to discuss key trends in Canada’s cybersecurity efforts. As a neighbor to the U.S., Canadian enterprises have observed the exponential growth of data threats occurring within U.S. borders. This begs the question: are Canadian organizations keeping pace? According to our...
In case you missed the memo, let me be the first to officially welcome you to the new world order of software as a service, or SaaS. Whether work or play, SaaS has enabled our on-demand, pay-as-you-go lifestyle. From consumer brands (such as Netflix) to enterprise SaaS providers (like ...
I’m not proud to admit it, but it’s true, reports of major data breaches make me happy (Unless of course the breach happens to affect me personally, and I have to deal with things like updating my online payment information for dozens of vendors because a new credit card number has bee...
Recientemente en Latinoamérica varios países han definido esquemas de regulación para la protección de datos, incluyendo Mexico, Costa Rica, Colombia, Ecuador y Perú entre otros. Esta reglamentación obedece a la preocupación de entidades gubernamentales por la privacidad de la informac...
We’ve seen movie after movie where criminals pack into a van with ski masks and ram into a bank with weapons. Once they get their hand on the money, the robbers race off with a bit more cash in their pocket. While old school theft is still an issue, nowadays we have the added pressure ...
Traditional security has always been metaphorically tied to the medieval castle building of old: building thicker walls and drawbridges, creating multiple perimeters, raising larger armies, you know – the whole nine yards. This paradigm extends into the modern world, which maintains it...
Last month was a big month for federal cybersecurity initiatives. With the announcement of the cybersecurity sprint results, many questions were posed by security professionals and businesses alike. The results announced on July 31 were positive and include: Federal Civilian agencies i...
Ski helmets, seat belts, and encryption. What comes to your mind when you read these words? You may immediately think “safety,” and you’d be right, but how about “speed enablers”? At first blush, that may not be the first concept that comes to mind, but there’s a pretty compelling c...
I attended BlackHat and DefCon this year and it continues to be an eye-opening experience. So as I stood at BlackHat speaking with prospects I continued to look around in awe at all of the vendors there. I began to wonder if a customer had unlimited funds and they bought every vendor t...
There are fundamental problems with sensitive information in healthcare … And many of those problems start and end with patient data. For the most part, healthcare organizations and professionals have always focused on the physical and mental well-being of their patients. A good thing ...
It seems like every time I write a blog, a new breach has occurred (for an up-to-date look at local, state and federal breaches I suggest you periodically review the Identity Theft Resource Center’s running list). Since I last penned a post, we’ve seen breaches of the Mayo Clinic, Citi...
Earlier this week, I came home from work, only to find my wife hanging up a framed picture that I was remiss in not getting to. The scene was not what I expected. In efforts to get the picture hung, my wife was using the heel side of a boot to drive the nail into the wall upon which th...
The cyber security, resiliency and accountability of IT systems at financial services organizations is rarely out of national headlines. Firms that operate in the financial space hold extremely sensitive data, so therefore attackers usually consider the effort and risk of attacking th...
Hear ye! Hear ye! The era of the information age has come. Once upon a time, the majority of information and assets were physical. But then the world continued to transition into the digital age, however organizations weren’t set up with the proper precautions to prepare for the inform...
As part of an initiative here @Vormetric to better connect IT Security back to people’s ordinary lives, we recently conducted a nationwide poll to ask a question about what people feel needs to be done if a foreign power is found to be behind hacks against the U.S. Government age...
Ever since I joined Vormetric in 2012, it’s been full steam ahead. Lately, I’ve been even more optimistic, excited and engaged (yes, it’s possible!) We’re coming up on our 15th year and I work with a group of incredibly smart, passionate and committed people. This means I generally wak...
Many aspects of our lives involve the creation, storage and exchange of very sensitive digital data that is governed by a variety of detailed compliance mandates.  From a business perspective, compliance is a critical framework without which many sectors – particularly financial servic...
So, in the wake of the OMB hack, the federal CIO (Tony Scott) has directed government agencies to get serious about cyber security. The “30-day sprint,” directs agencies to patch all known vulnerabilities; use information provided by Homeland Security to identify and mitigate known thr...
Earlier this week, Salesforce announced Salesforce Shield, a new set of services available to their customers that includes a strong set of data security features targeted directly at the needs of their enterprise customers.  Include capabilities for auditing, encryption, access contro...