Blog

Why is Encryption Such a Scary Thing?

I can’t tell you how many times I have heard an application and/or Thing developer say they were not encrypting their data because “encryption is too hard to implement”, “encryption would slow my application down to much”, or “I can’t use the data if it’s all encrypted.” At CENTRI, we feel all applications and Things … Continue reading Why is Encryption Such a Scary Thing?

Read More

Why (Open Source) Internet Solutions Are Great for The Unknown and Anonymous – But Create Significant Risks for the Enterprise

I want to highlight a couple examples showing why (I believe) solutions created ‘from the Internet side of the glass’ (open source) often fail the enterprise and subsequently require the enterprise to purchase and deploy additional technology to fill the gaps. Okay, this might go back a bit further than some of you remember…In the … Continue reading Why (Open Source) Internet Solutions Are Great for The Unknown and Anonymous – But Create Significant Risks for the Enterprise

Read More

Implementing Security from Scratch is Hard; Using CENTRI is Easy

So you are a Super Star application developer, or maybe you are leading the race to produce the next great Thing. Over the years you have honed your skills to the cutting edge of app and/or thing development. Although you pride yourself in constantly developing the uncommon, from time to time you need a widget … Continue reading Implementing Security from Scratch is Hard; Using CENTRI is Easy

Read More

Gartner Security and Risk Management Summit 2016

This past week, June 13-15, members of the CENTRI team went to the Gartner Security and Risk Management Summit 2016 event in National Harbor, MD. By all accounts, it was a successful conference full of opportunities to meet others in the data security and protection industry, learn about the current state of the industry, and … Continue reading Gartner Security and Risk Management Summit 2016

Read More

Protect Your Valuable Asset: Your Data

In the world of paper and coin, if I want to protect my valuables – things like stock certificates, my grandfather’s watch, etc., I would put them in a safe deposit box at the bank. Of course, there are numerous other options: under the mattress, in the breadbox, in a coffee can buried in the back yard under the big … Continue reading Protect Your Valuable Asset: Your Data

Read More

Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Earlier in 2016, after the U.S. Federal Bureau of Investigation (FBI) engaged in a legal battle with Apple over the unlocking of a particular iPhone device, little they knew it would reignite and escalate the old debate between security and privacy to unprecedented levels. On one hand, security advocates claim that one of the main … Continue reading Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Read More

Dear CISO – Your Single Most Important Objective

Let’s say you’re the CISO. What is your single most important objective? I think it’s spelled out in your title “information security,” and the single most important objective for you, or any CISO, is to protect the corporations’ information – the data. More specifically, it is to prevent the exfiltration of data. The problem is, … Continue reading Dear CISO – Your Single Most Important Objective

Read More

5 Real-World Benefits of Data Encryption Software

Businesses that have already invested in traditional perimeter IT security firewalls and detection systems are continuously looking for something more to protect their data. Between external hackers and internal staff, protecting data in all states is too tall a task for most legacy solutions. To combat this trend, enterprises are considering data protection and specifically data encryption solutions as … Continue reading 5 Real-World Benefits of Data Encryption Software

Read More

It’s Time for a New Approach to DDoS Mitigation for Your Business

Any business that has found themselves under a DDoS attack knows just how damaging it can be. DDoS attacks can suspend the availability of your products or services for hours, sometimes even days, without the right security measures. What is a DDoS Attack? DDoS stands for distributed denial-of-service. This is an attack that hackers or … Continue reading It’s Time for a New Approach to DDoS Mitigation for Your Business

Read More

$750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

A recent settlement between the Department of Health and Human Services’ Office of Civil Rights, or OCR, and Indiana-based Cancer Care Group is highlighting the importance of information security governing company policies and healthcare data security. The two parties agreed to a $750,000 settlement after a data breach lead to the exposure of over 55,000 … Continue reading $750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

Read More