Welcome!

Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

It's all ‘Bout That Access, ‘Bout That Access, ‘Bout That Access - 2015 Insider Threat Report Takeaways While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking alongside using physical force. Today we issued our 2015 Vormetric Insider Threat report. Coming off of the Sony breach and Obama’s State of the Union address, we can’t think of a better time to deliver a report that provides so much insight into where the cyber security industry stands. Here’s one stat that really stands out: Despite this unsettling news, results from our 2015 Vormetric Insider Threat Report show that insider threat awareness levels have increased: 55% of responden... (more)

Top 3 surprising results from the 2015 Vormetric Insider Threat Report

We had a couple of surprising findings come up in the data for the 2015 Vormetric Insider Threat report this year and I thought I’d highlight my top three here. 1 – People aren’t sure what solutions they need to solve the problem. Insider threats aren’t just traditional employees with access to financial data, critical IP or secrets. They now include a host of partners and service provider employees that also have access to enterprise networks, cloud and SaaS resources. Privileged users have become a primary concern as well with the access that their roles provide to system data ... (more)

Strata + Hadoop – Security in the Data Lake

About two weeks ago I attended the Strata + HADOOP world conference, February 2015, in San Jose.  I think the most notable observation from an IT perspective is that people are getting serious about it. The second is that the technology driving the HADOOP ecosystem is evolving at warp speed. ClickToTweet: Security in the Data Lake from Strata + Hadoop @AshvinKamaraju #DefenderOfData http://bit.ly/1FZjgkm One example for security – Cloudera now says that “Security is Foundational” and the new default. Cloudera also said that they created a data governance partnership with Intel an... (more)

Internet of Things Policies Required By @Vormetric | @ThingsExpo [#IoT]

IoT – Enterprise-Ready Policies for Personal Data Required By Andy Kicklighter Given the current global furor over continuing data breaches, Edward Snowden disclosures, the hue and cry around NSA data collection from mobile phones and mobile encryption, now is a good time to stop and think before we plunge wholesale into even more extensive collection of personal information from IoT environments and devices. Think how much worse a breach of data could be if it includes full profiles of people’s movements, actions, eating habits, purchase preferences or even more personal inform... (more)

A Guide to the CIO’s Toolbox By @Vormetric | @CloudExpo [#Cloud]

By Alan Kessler In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015... (more)