Cybersecurity Archives - HyTrust
https://www.hytrust.com/uploads/layer-10.jpg

Cybersecurity

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

A Unified Approach to Securing a Multi-Cloud Environment

Overview Over the last few years there has been rapid adoption of the public cloud primarily propelled by the following: Emerging technologies such as Docker containers & Kubernetes Increased appetite for cloud native applications Increased need to modernize monolithic applications using microservices etc. More and more enterprises are embracing a multi-cloud strategy for a variety […]

Avoid Becoming the Next Data Breach Victim

In the last year, some of the biggest companies in the world were plagued by equally massive data breaches – making it clear that organizations and IT teams of all sizes are in need of security reform. Only by implementing stronger security measures and policies can organizations prevent devastating security events from continuing to take […]

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Do You Know Where Your Sensitive Data Lives?

One of the biggest challenges organizations face today in trying to secure their IT environments is a lack of data awareness. Despite all the recent high-profile hacker attacks against well-known enterprises, many companies simply don’t know where much of their critical business information exists at any given time. Think about the files lying around that […]

Analyzing, Auto-Encrypting and Tagging Sensitive VMs

Last week HyTrust announced the launch of HyTrust CloudAdvisor Version 2.2.1 (HTCA 2.2.1) which provides further integration with HyTrust DataControl (HTDC) and HyTrust CloudControl (HTCC). More specifically, the new version supports the ability to: Automatically encrypt VMs using HyTrust DataControl when sensitive data is detected Analyze and monitor VMs encrypted by HyTrust DataControl Label VMs in […]

Thank You, Dr. Amoroso, for Making 3 Smart Cybersecurity Recommendations to the President-Elect

In what is likely the first open letter to President-Elect Donald J. Trump from a member of the U.S. cybersecurity community, an industry leader has made three smart recommendations regarding the nation’s security defenses—including choosing one standard security compliance framework (NIST), reducing dependence on enterprise perimeters, and expanding the educational Cyber Corps program. HyTrust applauds […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.