With all of the NSA, RSA privacy concerns in the news tied to if your computer systems or networks can be eves-dropped, what about your data storage?
Browsing: Data protection
CipherCloud, expands its platform through the acquisition of CloudUp Networks, a privately held provider of SaaS application security.
As the evening wore on, I suddenly started to wonder about “whistle blowers”. After all we live in a culture that puts the whistle blower on a pedestal.
Following the news that Target announced regarding it´s recent data breach affecting 110 million customers, here are some thoughts from security experts
Security policy and awareness are often lumped together and usually perceived as Awareness training on company policies.
Lancope, announces that its director of security research, Tom Cross, has been named a Ponemon Institute Distinguished Fellow.
He says, “It is a primitive civilization that cannot follow even its own rules.” This is where we seem to be.
By correlating the data, Websense has demonstrated how any attacker intercepting this data can create a precise blueprint of the target’s hardware
A Brief History of Ciphers – This infographic from CipherCloud starts 1900 BC & covers a brief outline of the history behind Ciphers until 2010.
Encryption keys stored by the same CSP that stores your data are easier for government agencies to acquire.