Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Vormetric Blog

We had a couple of surprising findings come up in the data for the 2015 Vormetric Insider Threat report this year and I thought I’d highlight my top three here. 1 – People aren’t sure what solutions they need to solve the problem. Insider threats aren’t just traditional employees with access to financial data, critical IP or secrets. They now include a host of partners and service provider employees that also have access to enterprise networks, cloud and SaaS resources. Privileged users have become a primary concern as well with the access that their roles provide to system data and resources. And the compromise of all of these accounts by either malicious insiders, nation state hackers or cybercriminals out for financial gain has been a core component in almost all of the major data breaches in the last year. Analysts and industry leaders alike can now regularly be ... (more)

2015 Cloud Security Predictions By @Vormetric | @CloudExpo [#Cloud]

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security are inseparably tied together for enterprises (see a partial list of our cloud partners here). Based on my conversat... (more)

A Guide to the CIO’s Toolbox By @Vormetric | @CloudExpo [#Cloud]

By Alan Kessler In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015... (more)

Strata + Hadoop – Security in the Data Lake

About two weeks ago I attended the Strata + HADOOP world conference, February 2015, in San Jose.  I think the most notable observation from an IT perspective is that people are getting serious about it. The second is that the technology driving the HADOOP ecosystem is evolving at warp speed. ClickToTweet: Security in the Data Lake from Strata + Hadoop @AshvinKamaraju #DefenderOfData http://bit.ly/1FZjgkm One example for security – Cloudera now says that “Security is Foundational” and the new default. Cloudera also said that they created a data governance partnership with Intel an... (more)

Internet of Things Policies Required By @Vormetric | @ThingsExpo [#IoT]

IoT – Enterprise-Ready Policies for Personal Data Required By Andy Kicklighter Given the current global furor over continuing data breaches, Edward Snowden disclosures, the hue and cry around NSA data collection from mobile phones and mobile encryption, now is a good time to stop and think before we plunge wholesale into even more extensive collection of personal information from IoT environments and devices. Think how much worse a breach of data could be if it includes full profiles of people’s movements, actions, eating habits, purchase preferences or even more personal inform... (more)