Computer hackers go out of their way to provoke chaos. They know the money it costs to repair the breach, restore the system and conduct damage control will send companies reeling.
Last week at Black Hat in Las Vegas, IT security firm Imperva discussed a “man-in-the-middle” attack that affects certain enterprise file-sync-and-share (EFSS) services, allowing hackers access to files transferred into the cloud. This is a very relevant and interesting vector of attack for EFSS services.
On November 24th, 2014 a group of hackers calling themselves “The Guardians of Peace” or the “GOP” leaked large amounts of data from Sony entertainment’s internal servers.
What is Pre-Boot Authentication? Pre-boot authentication is the processing of authenticating the user’s login credentials before the computer boots up. What this means is that when turning on a computer, the user will immediately be prompted with a request for their username and password, before they see their operating systems usual login prompt, and in fact, before the computer’s operating system even comes on line.
We live in the world of knowledge workers. A world where what a company knows is far more valuable than what a company physically possesses, which makes Data Security one of the most pressing concerns for Big Business—despite most businesses being unequipped to deal with these dangers.
The official Windows 10 rollout is almost here. After much anticipation, Microsoft will introduce its new operating system on July 29. WinMagic product experts are examining the new operating system’s security features so we can best advise our customers on what those features mean for regulatory compliance and overall security best practices.
Our previous blog posting established that storage encryption technologies, such as full disk encryption (FDE), and their associated key management functions should be separated from each other.
Have you ever wondered what happens to your data once a thief gets their hands on it? Bitglass, a cloud security company conducted an experiment to find out just what happens when data has been stolen. And the answer may surprise you.
What do you know about data encryption and decryption? Whatever it is, it might not be fully right. There are myths circulating about this topic, myths which can actually hurt your business. We’ve identified five of them, and explain why they’re wrong.
On May 21st WinMagic was chosen as one of the 2015 winners of the CATAAlliance Innovation and Leadership Awards. The CATAAlliance Innovation Awards celebrate the best in Canadian advanced technology and winners are recognized for their innovation, expertise, and leadership in Canada’s technology community.