HyTrust Blog | HyTrust

Blog

How do you securely destroy your data?

When building a comprehensive data security plan, organizations are beginning to recognize how long data can stick around – especially in virtualized infrastructures. It has never been more important to make sure that your data is permanently deleted when it is no longer needed. In a recent discussion thread, public cloud users discuss some of […]

What To Do When Your Credit Card Is Breached

In light of the recent breach of over 40 million credit and debit cards at Target, it makes sense to review some key actions consumers should take if they are concerned that their cards information was included. 1. Call your credit card company or check online to verify current charges, even if you haven’t been […]

Buckle Up! HyTrust and HighCloud Security for faster cloud adoption

I am very excited to share with you today that HyTrust has acquired HighCloud Security, a leader in cloud encryption and key management. The combination of our technologies will help organizations take advantage of the cloud more quickly, and more securely. HighCloud is a fantastic complement to HyTrust — adding cloud-optimized data security and privacy […]

HyTrust Covered in Barron’s Article, “Danger to Data Security: When Gods Become Demons”

We recently received coverage in a Barron’s article titled “Danger to Data Security: When Gods Become Demons”. The piece looks at the advantages and risks of IT virtualization and features a prominent quote from HyTrust co-founder and president Eric Chiu on the main challenge facing today’s virtualization efforts: ” ‘The key thing holding back the […]

Who Holds The Keys To Your Data Kingdom?

HyTrust co-founder and president Eric Chiu recently penned an article for Wired Magazine called “Brand Damage Through Information Access”, dissecting Edward Snowden’s leak of sensitive government data and its value as a fascinating, but troubling case study for the IT sector. Eric wrote: “Every corporation now has tremendous amounts of data and resources in virtualized […]

Establishing the ‘Two-Man Rule’ and Trust in Your IT Staff

The insider threat has come into greater focus in the wake of Edward Snowden’s admission that he leaked government secrets. The director of the NSA, Gen. Keith B. Alexander, said his agency would institute “a two-man rule” that would limit the ability of each of its 1,000 system administrators to gain unfettered access to the […]

A Role for Role-Based Monitoring in the Virtualization, Cloud Space

  With the advent of virtualization and the move towards software-defined clouds, the way we perform IT and how we measure its success has changed. As a result many of the ways we traditionally secure infrastructure no longer apply or plainly come up short. Great article by our own Alan LeFort outlining what cloud and virtualization […]

How Data for One of the Biggest US Banks Got Compromised

Many merchants look to their banks and card brands for guidance to meet compliance requirements and properly store and process credit card information. Banks oblige. For example, on the merchant website of Bank of America (http://merch.bankofamerica.com/data-security/data-compromise/types-of-br…) there is a clear and compelling description of the possible electronic breaches and measure that should be taken to […]

Department of Energy Access Credentials? – Sold

If I had a dollar every time I heard “we hired our administrators – we trust them” I would be able to buy a very nice car by now. Of course, this optimistic outlook can use a doze of healthy paranoia. Most administrators are good trustworthy corporate citizens. However, there are always some who get […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.