Welcome!

Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

IoT – Enterprise-Ready Policies for Personal Data Required By Andy Kicklighter Given the current global furor over continuing data breaches, Edward Snowden disclosures, the hue and cry around NSA data collection from mobile phones and mobile encryption, now is a good time to stop and think before we plunge wholesale into even more extensive collection of personal information from IoT environments and devices. Think how much worse a breach of data could be if it includes full profiles of people’s movements, actions, eating habits, purchase preferences or even more personal information.  Consider at the same time the potentials for abuse if this information is improperly handled or made available. ClickToTweet: IoT – The need for enterprise ready personal data policies @akicklighter #DefenderOfData http://bit.ly/1CvgRPR It seems inevitable that legislation will lag our... (more)

Data Breaches & Five Stages of Grief By @Vormetric | @CloudExpo [#Cloud]

Data Breaches and the Five Stages of Grief: A Prediction for Next Year By Charles Goldberg I try to keep on top of the news, particularly as it relates to the nature and severity of cyber attacks taking place. Sadly, there’s been no shortage of reading material lately. Last month, there were reports on breaches at Kmart and Dairy Queen (my family loves Blizzards). Updates then came out about a massive breach at Home Depot. Then more recently, there’s been the spate of nation-state attacks on the USPS, National Oceanic and Atmospheric Administration (NOAA), Sony Entertainment and ... (more)

Going Global with the @Vormetric Insider Threat Report | @CloudExpo [#Cloud]

While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of course, there can be no denying that the breadth and depth of private and public sector breaches in the past few years that have resulted from trusted insiders turning rogue or being compromised by perpetrators of APTs and the like indicates that there is a major disconnect when it comes to organi... (more)

What does tokenization mean for our European customers?

You may have seen the recent blog post from Charles Goldberg, which provides an overview of tokenization and our new product offering in this area.  Here in the UK and Europe, we’re seeing specific demand for these capabilities around three key areas, which I’d like to highlight here. : Euro and UK Applications for Tokenisation and Data Masking from @Vormetric http://bit.ly/1KH4mR5 PCI DSS If an organisation has any need to handle payment card details, it must adhere to PCI compliance guidelines.  Although in many regards Europe is at the cutting edge of card secur... (more)

The Health Internet of Things

Several months ago, I had the unique opportunity of judging a security competition at a major university in New York City. The ground rules were simple. Students needed to propose the best legislation to help secure the consumer from hacking and cybercrime. The presentations were really quite amazing and insightful with one common thread – it all revolved around the impact of a breach based on the ‘internet of things”. Difficult to imagine, but not completely preposterous, scenarios were laid out where common consumer electronics could get hacked such as your NEST thermostat, y... (more)