Have you ever heard the term “media encryption,” and wondered what it meant? Or, perhaps you know what it means, but you don’t think it applies to you. Read on to learn the definition for media encryption and why it’s necessary for everyone to use.
Do you travel for business extensively? Or are you a manager whose employees frequently travel? You should be concerned about data security. Your sensitive information might be at risk from hackers and other criminals. What can you do to make sure your data stays safe? Read on for the secret to protecting data from leaks when you’re on the road.
According to Wikipedia, “in 2014, $50.9 billion was spent during the 4-day Black Friday weekend”. People are eager to jump on the great Black Friday and Cyber Monday deals! What else comes with these amazing sales? Thieves and cybercriminals! They prey on the uninformed organizations that keep their guard down, ready to steal your customer’s credit card information!
When you think of retail, what’s the first thing that comes to mind? It’s probably the sound of a credit card being processed by a cashier. Hackers also hear the noise of a register, only they’re hearing it because they’ve stolen your financial information and are spending your money on merchandise you’ll never use.
This year (2015) the Trusted Computing Group (TCG) Storage Work Group (SWG) published two new specifications derived from the Opal SED specification called Opalite and Pyrite. You may already be familiar with the benefits of using an Opal SED vs software encryption in your laptops and desktops, but are puzzled as to why there are 2 new standards. Perhaps you even wonder if they would be a better fit for your needs than Opal.
It’s all about the data. I have been involved in cloud computing since 1999 (although we called it multi-tenant hosting & ASP – application service provider) and for sixteen years security has consistently been the #1 concern when organizations are asked about their adoption of cloud models. The concern does not reside with the use of a storage array they have no access to or the utilization of a virtual machine cluster in some unknown data center, it’s all about the data and sensitive information.
The thought of provisioning multiple devices can strike fear into the heart of even seasoned professionals. It’s a situation in which a great deal can go wrong, leaving the IT department on the hook. Provisioning multiple devices doesn’t have to be a nightmare, though. Consider this your guide for making multi device security software provisioning simple and hassle-free.
Imagine this: your worst nightmare has taken place. You’ve found out that you’ve been hacked. Your most valuable data is now in someone else’s hands, and your company is going to suffer enormous damage to its reputation. What do you do now? Your first instinct is probably to assign blame. Here’s what you should do instead: ask the following questions about the hack. They’ll help you make sense of it.
In our previous blog posting, we explained WinMagic’s two-stage model for enterprise key file deployment. Enterprise key file deployment is a highly complex endeavor, with many use cases for device provisioning to consider and address; additional challenges include speed, security, and scalability. To overcome these challenges, the WinMagic model leverages pre-boot networking. In this blog posting, we explain the basics of pre-boot networking, examine how it can be utilized to improve key file deployment, and study the benefits provided by using it throughout the enterprise.
What does a website devoted to encouraging extramarital affairs, a health insurance company and Harvard University have in common? They all announced they had suffered data breaches in 2015.
Are you considering deploying an encryption solution? It can be a difficult decision – which vendor do you choose? Who will provide the most reliable, effective encryption? Some people say, “Why go with a proprietary solution at all? Open source encryption software is free, and it works just as well.” Are these people right? Read on to learn about the differences between SecureDoc, WinMagic’s flagship product, and TrueCrypt, an open source encryption program.
During the Black Hat London presentation “Abusing Android Apps and Gaining Remote Code Execution,” NowSecure mobile security researcher Ryan Welton dramatically revealed that over 600 million Samsung mobile devices are vulnerable to an attack that is “highly reliable, completely silent, and affects all devices.”
Some people argue that Apple iPhone products are the best line of smartphones on the planet. It would be difficult to disagree with them. Apple consistently creates superb devices that combine modern aesthetics, famously tight security and excellent functionality into a stylish package.
As I was reviewing Gartner’s 2014 Magic Quadrant (MQ) for Mobile Data Protection, not surprisingly I found that nearly every competitor on that grid offers more than just data encryption. With anti-virus and firewall solutions being the primary focus, data encryption literally seems to be a check mark on their existing arsenal.
Bring Your Own Device (BYOD) is being hailed by many as a revolutionary move and condemned by others as a massive security risk.
Our previous blog posting explained the need for more usable and effective intelligent key management solutions for enterprises. We defined intelligent key management as a centralized enterprise product that is application aware, and that works at the lowest possible layer to provide protection for that layer and all the layers above it.