encryption

06.21.16

Let’s Go All The Way

by

There is a certain frustration when you map out some wonderful plan only to see it get stalled somewhere close to the finish line. Doesn’t matter what it is – that epic blog post, the 427 Cobra project in the garage or even wrapping up that virtualization certification – whatever. One thing we have seen […]

Read More

06.01.16

Infosec Europe 2016 – Stand A105 – HyTrust will be there

by

Once again this year, June 7-9, Infosec Europe is happening in London and this year’s show promises to be the best one yet. Last year the show had over 12,000 visitors from 80 countries. This year, we anticipate an even bigger and better turnout. We invite you to drop by for a shot or two […]

Read More

08.19.15

Obligatory Ashley Madison Ambulance Chasing Blog Post

by

“I am surprised….no encryption has been used” – Per Thorsheim, security expert on Ashley Madison breach quoted by BBC News. As you have probably heard, Ashley Madison, a dating site for married people who wanted to date outside their marriage, was breached and as of August 18, about 10 gigs of data containing personal information […]

Read More

08.13.15

Phasers or Shields? Hackback vs. Defensive Approaches

by

For years there has been discussion of “hacking back”, using active measures to deal with attacks, including striking back at the systems used to launch attacks. Indeed, CrowdStrike raised eyebrows back in 2011 with statements that many read as being in favor of hacking back or retaliating against attackers. More recently, Randall Fort, director of […]

Read More

07.13.15

Get More out of the Cloud

by

The public cloud has been widely adopted, not only by consumers but also by enterprises ranging in size from SMB to Fortune 500. Indeed, one of the challenges of the cloud has been containing and controlling that migration as many have found it faster and more convenient to route around corporate IT and deploy cloud […]

Read More

03.27.15

Encryption Key Management vs. Cloud-Based Encryption: Protecting Data from Governments (and Hackers)

by

The Snowden scandal did more than alert businesses to the increasing dangers of system intrusion. It also made us realize that part of our national defense system includes keeping tabs on data in the cloud. With so much information stored in the cloud, how can we be sure those hosting our data aren’t obligated to […]

Read More

03.20.15

When Consumer Privacy Is a Competitive Advantage, Security Can Be a Marketing Tool

by

New research from Forrester predicts that strong privacy policies will give businesses a competitive edge in 2015. We think Forrester has a good point. Research shows that privacy is a major concern for consumers, so companies with strong security will be able to leverage their strength and enjoy the marketing benefits. When faced with the […]

Read More