Blog

Dear CISOs – Your Single Most Important Objective

Let’s say you’re the CISO. What is your single most important objective? I think it’s spelled out in your title “information security,” and the single most important objective for you, or any CISO, is to protect the corporations’ information – the data. More specifically, it is to prevent the exfiltration of data. The problem is, … Continue reading Dear CISOs – Your Single Most Important Objective

Read More

5 Real-World Benefits of Data Encryption Software

Businesses that have already invested in traditional perimeter IT security firewalls and detection systems are continuously looking for something more to protect their data.  Between external hackers and internal staff, protecting data in all states is too tall a task for most legacy solutions.  To combat this trend, enterprises are considering data protection and specifically data encryption solutions as … Continue reading 5 Real-World Benefits of Data Encryption Software

Read More

It’s Time for a New Approach to DDoS Mitigation for Your Business

Any business that has found themselves under a DDoS attack knows just how damaging it can be. DDoS attacks can suspend the availability of your products or services for hours, sometimes even days, without the right security measures. What is a DDoS Attack? DDoS stands for distributed denial-of-service. This is an attack that hackers or … Continue reading It’s Time for a New Approach to DDoS Mitigation for Your Business

Read More

$750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

A recent settlement between the Department of Health and Human Services’ Office of Civil Rights, or OCR, and Indiana-based Cancer Care Group is highlighting the importance of information security governing company policies. The two parties agreed to a $750,000 settlement after a data breach lead to the exposure of over 55,000 patients’ records. In 2012, … Continue reading $750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

Read More

Best Practices: Encryption for Financial Services

Encryption for financial services is a highly effective way to achieve data security. It involves translating information into a secret code and having access to a secret password or key to read an encrypted file. The 2 main types of encryption are the following: Public-key encryption: utilizes 2 different keys at one time. Only your … Continue reading Best Practices: Encryption for Financial Services

Read More

Survey Shows Slow Down in Bring Your Own Device Trends

Industry watchers have been predicting a future boom in Bring Your Own Device (BYOD) policies in businesses. Gartner Research found that at least half of employers would require employees to provide their own devices by 2017. In addition, Mobile Device Management (MDM) has given birth to an entirely new market that’s expected to hit $4 … Continue reading Survey Shows Slow Down in Bring Your Own Device Trends

Read More

Educate Your Company on Three Key Areas of Data Security

A recent study by Dell found that 75 percent of organizations have experienced some sort security breach within the last year. However, only 18 percent have made predicting and detecting future threats a top priority. Unfortunately, security strategies tend to be more reactive than proactive. Is that an effective approach? Not at all. In fact, … Continue reading Educate Your Company on Three Key Areas of Data Security

Read More

Why Enterprise Security Needs New Perspectives and Tools

These days, the digital world can be a scary place for businesses. On top of the already complex issues businesses face, they must also rise to meet the increasing demands of security. The capabilities of digital hackers are evolving at a pace that outstrips almost every other aspect of the digital corporate universe. To make … Continue reading Why Enterprise Security Needs New Perspectives and Tools

Read More

Why SSL Alone Doesn’t Cut it Anymore

In the 1995 motion picture The Net, Sandra Bullock plays a system analyst whose social interactions occur mainly online within the confines of her computer screen. She telecommutes to work, disassembles computer games, and orders pizza online, all the while she chats with a friend over the phone. However, none of her computer prowess and … Continue reading Why SSL Alone Doesn’t Cut it Anymore

Read More

Waiting for the “Sh–IoT” to Hit the Fan

A lot has been written about the Internet of Things or IoT in the past several years. Tens of billions of connected devices around the world in the not too distant future. Huge improvements with new products and services from wearable devices to smarter oil rigs. Enhanced customer experiences. A giant market opportunity for a … Continue reading Waiting for the “Sh–IoT” to Hit the Fan

Read More