Blog

Simplifying IoT Security for Developers: Tackling Build vs. Buy Options

For Internet of Things (IoT) solutions, the trend is toward more data, more access, and more connectivity. IoT developers are now tasked with not only bringing these solutions to market rapidly, but must also ensure that appropriate security and data protection measures are implemented from the beginning – no business can afford the high costs … Continue reading Simplifying IoT Security for Developers: Tackling Build vs. Buy Options

Read More

Notes from the Security of Things Forum in Cambridge, MA, 2016

The need for good security to protect the IoT connected world seems like an obvious statement. There are more things connecting every day and the projections from the industry watch-dogs are staggering.  Last week I attended the Security of Things Forum in Cambridge, just a short walk from the Harvard campus. The overwhelming topic was … Continue reading Notes from the Security of Things Forum in Cambridge, MA, 2016

Read More

Implementing IoT Security from Scratch is Hard; Using CENTRI is Easy

So you are a Super Star IoT application developer, or maybe you are leading the race to produce the next great Thing. Over the years you have honed your skills to the cutting edge of app and/or thing development. Although you pride yourself in constantly developing the uncommon, from time to time you need a … Continue reading Implementing IoT Security from Scratch is Hard; Using CENTRI is Easy

Read More

Gartner Security and Risk Management Summit 2016

This past week, June 13-15, members of the CENTRI team went to the Gartner Security and Risk Management Summit 2016 event in National Harbor, MD. By all accounts, it was a successful conference full of opportunities to meet others in the data security and protection industry, learn about the current state of the industry, and … Continue reading Gartner Security and Risk Management Summit 2016

Read More

Protect Your Valuable Asset: Your Data

In the world of paper and coin, if I want to protect my valuables – things like stock certificates, my grandfather’s watch, etc., I would put them in a safe deposit box at the bank. Of course, there are numerous other options: under the mattress, in the breadbox, in a coffee can buried in the back yard under the big … Continue reading Protect Your Valuable Asset: Your Data

Read More

Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Earlier in 2016, after the U.S. Federal Bureau of Investigation (FBI) engaged in a legal battle with Apple over the unlocking of a particular iPhone device, little they knew it would reignite and escalate the old debate between security and privacy to unprecedented levels. On one hand, security advocates claim that one of the main … Continue reading Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Read More

Dear CISO – Your Single Most Important Objective

Let’s say you’re the CISO. What is your single most important objective? I think it’s spelled out in your title “information security,” and the single most important objective for you, or any CISO, is to protect the corporations’ information – the data. More specifically, it is to prevent the exfiltration of data. The problem is, … Continue reading Dear CISO – Your Single Most Important Objective

Read More

5 Real-World Benefits of Data Encryption Software

Businesses that have already invested in traditional perimeter IT security firewalls and detection systems are continuously looking for something more to protect their data. Between external hackers and internal staff, protecting data in all states is too tall a task for most legacy solutions. To combat this trend, enterprises are considering data protection and specifically data encryption solutions as … Continue reading 5 Real-World Benefits of Data Encryption Software

Read More

It’s Time for a New Approach to DDoS Mitigation for Your Business

Any business that has found themselves under a DDoS attack knows just how damaging it can be. DDoS attacks can suspend the availability of your products or services for hours, sometimes even days, without the right security measures. What is a DDoS Attack? DDoS stands for distributed denial-of-service. This is an attack that hackers or … Continue reading It’s Time for a New Approach to DDoS Mitigation for Your Business

Read More

$750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

A recent settlement between the Department of Health and Human Services’ Office of Civil Rights, or OCR, and Indiana-based Cancer Care Group is highlighting the importance of information security governing company policies and healthcare data security. The two parties agreed to a $750,000 settlement after a data breach lead to the exposure of over 55,000 … Continue reading $750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

Read More