There are many Encryption Challenges in the Tech world today. We know that encryption is one of the fastest emerging data security options today. An increasing number of organizations worldwide are adopting encryption to address the growing concerns of data safety and data privacy for compliance regulations. Data Encryption is a time-tested tool that can severely hinder attackers in their goal to steal confidential user and customer data, trade secrets, and more. In addition, to the complex regulations, the increasing adoption of new technologies such as mobility, cloud and virtualization have also found the need for encryption more than ever before.
If you have been following our blogs you know that the ideal FDE architecture has two main components. The actual encryption component is a separate layer from the key management. The encryption can be done by the OS (e.g. BitLocker for Windows or FileVault2 for Mac), by Self-Encrypting Drives (SEDs) or by ISVs such as WinMagic’s FIPS140-2 validated software cryptographic engine.
If you’re like most people, you use tools like DropBox or Box to send and share your files via the Cloud. But how do you know that the files you share via these tools are safe? Do you trust the Cloud service provider and the security measures they’ve put in place? How sure are you that these security measures are foolproof?
In a previous blog I wrote that at Black Hat Europe 2015, two forensics experts from KPMG Canada presented their findings in a presentation titled “Bypassing Self-Encrypting Drives (SED) in Enterprise Environments”.
When you move into a new place, one of the first things you do is change all the locks. It’s important to your sense of security that you control who has access to your home. Changing the locks just makes logical and practical sense. This same logic should also be applied to your business thinking when you are looking to secure your sensitive information in a new environment or an environment you don’t fully control.
Earlier this month, WinMagic announced the general availability of the new security software solution that provides full enterprise controlled key management and encryption for virtual works load running in public and private IaaS environments, SecureDoc CloudVM.
Can you remember the last time you installed security updates at work? If the answer to that question is “no,” that’s a big problem. Patches and updates protect computers from dangerous threats. Read on to learn why installing security updates across your corporate network can save your firm from disaster.
Holistic, comprehensive security strategies, centered on protecting data, not devices, are easier than ever thanks to current encryption technology. According to a recent Ponemon Institute study, over the last five years healthcare organizations have slowly increased their investment in data security along with new technologies to better protect Protected Health Information (PHI).
Who gives you advice on mobile device security? Unless that person is an expert in the field, he or she is most likely giving you the wrong information. We’ve compiled some of the worst advice we’ve ever heard about mobile device security – read on to learn why following it can actually do more harm than good.
I once again had the pleasure and privilege of attending the largest security conference in the world; the 2016 RSA Security Conference in San Francisco. This year’s conference was well attended with a reported 40,000 attendees. This is up from fewer than 20,000 just a few years ago.
Years ago, tech experts predicted that a new wave of technology would hit the scene and completely rework the way we, well, work. Cloud computing was viewed as the future of the enterprise – at the time, this mysterious yet highly intriguing concept promised to dramatically increased efficiencies that would enable companies to reduce costs and increase business flexibility.