As I was reviewing Gartner’s 2014 Magic Quadrant (MQ) for Moblie Data Protection, not surprisingly I found that nearly every competitor on that grid offers more than just data encryption. With anti-virus and firewall solutions being the primary focus, data encryption literally seems to be a check mark on their existing arsenal.
Bring Your Own Device (BYOD) is being hailed by many as a revolutionary move and condemned by others as a massive security risk.
Our previous blog posting explained the need for more usable and effective intelligent key management solutions for enterprises. We defined intelligent key management as a centralized enterprise product that is application aware, and that works at the lowest possible layer to provide protection for that layer and all the layers above it.
Last week at Black Hat in Las Vegas, IT security firm Imperva discussed a “man-in-the-middle” attack that affects certain enterprise file-sync-and-share (EFSS) services, allowing hackers access to files transferred into the cloud. This is a very relevant and interesting vector of attack for EFSS services.
On November 24th, 2014 a group of hackers calling themselves “The Guardians of Peace” or the “GOP” leaked large amounts of data from Sony entertainment’s internal servers.
We live in the world of knowledge workers. A world where what a company knows is far more valuable than what a company physically possesses, which makes Data Security one of the most pressing concerns for Big Business—despite most businesses being unequipped to deal with these dangers.
The official Windows 10 rollout is almost here. After much anticipation, Microsoft will introduce its new operating system on July 29. WinMagic product experts are examining the new operating system’s security features so we can best advise our customers on what those features mean for regulatory compliance and overall security best practices.