Before I delve into key management for FDE, I want to clarify that the ideal FDE architecture has two main components. The actual encryption component is a separate layer from the key management.
I’ve been asked a couple of times in the nearby past by partners, customers and prospects that encryption would not be secure for millions of years as always being stated. Instead of this it would be possible to “break” encryption within seconds in a 15-20 years’ timeframe when quantum computers become reality.
Whether you’re ready to admit it or not, the holiday shopping season is upon us. Take a minute and ask yourself: what kind of shopper am I? Do you tend to finish your gift-giving excursions back in August, or will you be spending the night before your holiday scrounging for last minute ideas? Regardless of which bucket you fall into, there are two upcoming days dedicated solely to shoppers of all kinds: Black Friday and Cyber Monday.
Do you use your mobile device for work? And if yes, is there a BYOD policy you’re required to follow? If not, you are not the only one. According to the study from BT, 98% of American organizations allow employees to use mobile devices for work purposes.
There have been many major retail data breaches in the past few months: Target, Home Depot etc. Those may have come and gone, but the risk has not. Once your information has been stolen, you do not get it back. According to John McCollough president of the Financial Crime Services, cyber criminals will hang on to your information, circling back months to years later, so you are constantly at risk.
NVMe technology had a big presence at the Intel Developer Forum (IDF), held in San Francisco of September this year. There were products and demonstrations from about a dozen leading vendors including Intel and Micron. I also attended quite a few sessions, but the one on NVMe was the only one that was overflowing with people.
The retail industry has been in the spotlight with data breach after data breach. With the holiday season fast approaching, companies need to take extra measures to secure transactions. According to Verizon PoS invasions accounted for 31% of the 148 retail breaches in 2013, and these invasions accounted for 75 percent of the 137 accommodation sector breaches. This trend in attacks on payment card systems is only accelerating.
Last week, thousands of IT security professionals gathered in Toronto for the annual SecTor Security Conference to share compelling research and new techniques. From malware attacks to unencrypted stolen devices, data theft is rampant in the enterprise, and security solutions are, well, supposed to be the solutions. Security experts at SecTor presented on the various ways organizations can learn from past mistakes and how vendors can aid in this process.
In what is beginning to appear as a weekly occurrence, another major retailer has announced they have been a victim of a data breach. Late last week, Sears-owned discount department store Kmart, quietly announced via a Securities and Exchange Commission filing that the brand had suffered a breach through its point of sale (PoS) systems which were ultimately comprised by malicious software.