Newsletters

image description

What if you could deploy encryption in a snap 2016|September

 
Forward to a Friend  
Vormetric Data Security  
September 2016 NEWSLETTER
What if you could deploy encryption in a snap
    CEO Alan Kessler Icon
From the CEO's chair

The Not-So-Brave New world of Government Sponsored Encryption

Alan Kessler | CEO

In late August, news outlets reported a group calling itself the "Shadow Brokers" had leaked a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team, otherwise known as the Equation Group. According to the New York Times, the leaked code "was designed to break through network firewalls and get inside the computer systems of competitors like Russia, China and Iran. That, in turn, allows the N.S.A. to place 'implants' in the system, which can lurk unseen for years and be used to monitor network traffic or enable a debilitating computer attack." [...]

READ MORE ➔

  placeholder  
 

The Impact of Government Requests for Backdoor Access to Encrypted Data
Louise Bulman, AVP of EMEA

Since the well-documented FBI–Apple encryption dispute made global headlines, there has been on-going debate as to whether governments should ever be granted special access to encrypted data. In the UK, the debate intensified following the announcement that the Investigatory Powers Bill (IPB) had been approved by the terror laws watchdog. The somewhat controversial act grants agencies the right to monitor online activities of citizens, and is supported by examples of instances when the monitoring of email, phone and internet behaviour has had a real impact in saving lives. [...]

READ MORE ➔

 
placeholder
 

PCI Security Standards Council Provides Updates on Encryption and Scope Reduction
Charles Goldberg, Sr Director, Product Marketing

The reality is that many business leaders won’t do the right thing in terms of investing in security. At least not until they’re in some way coerced or forced into it. The headlines will keep appearing, detailing how consumer data continues to be exposed because some of the most basic safeguards weren’t employed. Just to be clear, I’m not saying that security is easy. There are a lot of sophisticated cyber adversaries and significant threats that are very difficult to combat. [...]

READ MORE ➔

 
placeholder
 

What Can Automation and Innovation do for Your Organization?
Derek Tumulak, VP, Product Management

Organizations are learning (don’t worry, most have done the learning) that if they don’t do encryption right – people will have access to sensitive data. With encryption and other cryptographic technologies acting as building blocks within a larger, layered IT security strategy, it’s clear that there are multiple needs for these technologies across enterprises, as more information is collected, stored and used throughout organizations. But these basic security needs don’t just stop at the enterprise level. Cloud service providers need to provide protection and visibility to their customers, especially when it comes to encryption key management and access control. [...]

READ MORE ➔

 
placeholder
 

Why the Brazzers Forum Cyber Breach Is Another Reminder to Encrypt Sensitive Customer Data
Jon Geater, CTO, Thales e-Security

Last week nearly 800,000 customer details were taken from a forum associated with popular adult websites Brazzers, with usernames and passwords of users being exposed by the cyber-attackers.

The leak, which was disclosed by a breach notification website called vigilante.pw, contained 790,724 email records in total, alongside forum usernames and even plain-text passwords. This data is now available to anyone who sees it; and will most likely fall into the hands of those who will gain from promoting adult services to what would appear to be an engaged customer base. However, more worryingly, those with malicious intent could look to extort the compromised users through blackmail or threats of ransom. [...]

READ MORE ➔

 
placeholder
 
Read the Thales Orchestrator Solution Brief Encryption usage
is on the rise!
Join Vormetric at Dreamforce October 4-7, 2016
Thales Orchestrator Solution Brief encryption application trends study Dreamforce
Automate deployment and operations of encryption services, at any scale. Read the latest report
from Ponemon.
Secure Data on Your Terms: Platform Encryption and Key Management.
Read More Read More Register now
 
Resources footer image
  Thales e-Security in the News Recent Press Releases Company Events Data Security White Papers
 
  REQUEST A PRODUCT DEMO > CONNECT WITH US
facebook Twitter Google+ Linkedin YouTube
 
 
 

Thales e-Security (@Thalesesecurity) is the industry leader in data security solutions that span physical, virtual and cloud environments. Data is the new currency and Thales e-Security helps enterprise customers and government agencies protect what matters—their sensitive data—from both internal and external threats. For more information, visit www.thalesesecurity.com.

 
 

©2016 Thales e-Security, Inc. All rights reserved. All trademarks are the property of their respective owners.