encryption Archives - HyTrust
https://www.hytrust.com/uploads/Banner.Products.KeyControl.jpg

encryption

Your Keys are the Key to Success!

In today’s world of corporate data security, your keys are the key to your success.  Encryption keys, that is!  With the continued and growing challenges of protecting highly sensitive and critical data of your customers, students, employees, or any other demographic that entrusts data to you; enterprises are looking to the widespread use of encryption […]

Read More

HyTrust-powered Encryption Available on Pivot3

Today, Pivot3 announced new policy-based security management capabilities, powered by HyTrust, in its Intelligence Engine.  Pivot3’s expanded Intelligence Engine capabilities allow organizations to automate and simplify the process of protecting sensitive data with comprehensive, standards-based security. The platform also facilitates regulatory compliance as customers acquire and manage data across the edge, core and cloud. As […]

Read More

Think You Checked the Encryption Box with SEDs? Think Again!

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Read More

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Read More

Let’s Go All The Way

There is a certain frustration when you map out some wonderful plan only to see it get stalled somewhere close to the finish line. Doesn’t matter what it is – that epic blog post, the 427 Cobra project in the garage or even wrapping up that virtualization certification – whatever. One thing we have seen […]

Read More

Infosec Europe 2016 – Stand A105 – HyTrust will be there

Once again this year, June 7-9, Infosec Europe is happening in London and this year’s show promises to be the best one yet. Last year the show had over 12,000 visitors from 80 countries. This year, we anticipate an even bigger and better turnout. We invite you to drop by for a shot or two […]

Read More

Obligatory Ashley Madison Ambulance Chasing Blog Post

“I am surprised….no encryption has been used” – Per Thorsheim, security expert on Ashley Madison breach quoted by BBC News. As you have probably heard, Ashley Madison, a dating site for married people who wanted to date outside their marriage, was breached and as of August 18, about 10 gigs of data containing personal information […]

Read More

Phasers or Shields? Hackback vs. Defensive Approaches

For years there has been discussion of “hacking back”, using active measures to deal with attacks, including striking back at the systems used to launch attacks. Indeed, CrowdStrike raised eyebrows back in 2011 with statements that many read as being in favor of hacking back or retaliating against attackers. More recently, Randall Fort, director of […]

Read More

Get More out of the Cloud

The public cloud has been widely adopted, not only by consumers but also by enterprises ranging in size from SMB to Fortune 500. Indeed, one of the challenges of the cloud has been containing and controlling that migration as many have found it faster and more convenient to route around corporate IT and deploy cloud […]

Read More

Encryption Key Management vs. Cloud-Based Encryption: Protecting Data from Governments (and Hackers)

The Snowden scandal did more than alert businesses to the increasing dangers of system intrusion. It also made us realize that part of our national defense system includes keeping tabs on data in the cloud. With so much information stored in the cloud, how can we be sure those hosting our data aren’t obligated to […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.