encryption Archives - HyTrust


Do you know where your KeyControl Admin Keys are located?

If you find yourself asking what a KeyControl Admin Key is, then go brew another pot of coffee or tea as we have some important things to discuss. If you understand the importance of your KeyControl Admin Key, continue reading. If you haven’t gotten around to downloading it from the appliance or forget how to […]

Read More

HyTrust and IBM announce
the Industry’s Highest Level of data protection for
VMware workloads in the Cloud

Enterprise clients on a digital transformation journey are looking to move workloads to the public cloud.  However, recent news reports of data breaches show why customers are still wary of moving sensitive data and associated workloads to the public cloud.  Per a recent report by the Ponemon Institute (The Cost of a Data Breach Report […]

Read More

Your Keys are the Key to Success!

In today’s world of corporate data security, your keys are the key to your success.  Encryption keys, that is!  With the continued and growing challenges of protecting highly sensitive and critical data of your customers, students, employees, or any other demographic that entrusts data to you; enterprises are looking to the widespread use of encryption […]

Read More

HyTrust-powered Encryption Available on Pivot3

Today, Pivot3 announced new policy-based security management capabilities, powered by HyTrust, in its Intelligence Engine.  Pivot3’s expanded Intelligence Engine capabilities allow organizations to automate and simplify the process of protecting sensitive data with comprehensive, standards-based security. The platform also facilitates regulatory compliance as customers acquire and manage data across the edge, core and cloud. As […]

Read More

Think You Checked the Encryption Box with SEDs? Think Again!

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Read More

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Read More

Let’s Go All The Way

There is a certain frustration when you map out some wonderful plan only to see it get stalled somewhere close to the finish line. Doesn’t matter what it is – that epic blog post, the 427 Cobra project in the garage or even wrapping up that virtualization certification – whatever. One thing we have seen […]

Read More

Infosec Europe 2016 – Stand A105 – HyTrust will be there

Once again this year, June 7-9, Infosec Europe is happening in London and this year’s show promises to be the best one yet. Last year the show had over 12,000 visitors from 80 countries. This year, we anticipate an even bigger and better turnout. We invite you to drop by for a shot or two […]

Read More

Obligatory Ashley Madison Ambulance Chasing Blog Post

“I am surprised….no encryption has been used” – Per Thorsheim, security expert on Ashley Madison breach quoted by BBC News. As you have probably heard, Ashley Madison, a dating site for married people who wanted to date outside their marriage, was breached and as of August 18, about 10 gigs of data containing personal information […]

Read More

Phasers or Shields? Hackback vs. Defensive Approaches

For years there has been discussion of “hacking back”, using active measures to deal with attacks, including striking back at the systems used to launch attacks. Indeed, CrowdStrike raised eyebrows back in 2011 with statements that many read as being in favor of hacking back or retaliating against attackers. More recently, Randall Fort, director of […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.