Welcome!

Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

IoT Drives Stronger Security for Big Data Environments By Ashvin Kamaraju The slogan “Internet of Things (IoT) X Big Data = Unprecedented Value!” caught my attention as I was listening to a presentation from Intel Corporation. The scale of the IoT disruption was described in terms of things, data and value: 50 billion devices are expected to connect to the Internet by 2016. As recently as 2013 this was 0.5 Billion These devices will generate 35 Zetabytes of data! And can create an estimated value of $2 to $6 trillion in global economic impact. Now that is huge by any measure! The Internet of Things or IoT is the next big trend promising to connect literally every device on the planet to the internet. IoT will fuel a data explosion that will provide the data needed to improve services, offerings and life in general by analysis and use of the information generated. M... (more)

Insider Security Threats By @Vormetric | @CloudExpo [#Cloud]

What We Talk About When We Talk About Insider Threats What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions. But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be considered the “insider threat” poster child, not all employees have malicious intentions. In fact, it’s likely the vast majority of your employees have comp... (more)

Going Global with the @Vormetric Insider Threat Report | @CloudExpo [#Cloud]

While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of course, there can be no denying that the breadth and depth of private and public sector breaches in the past few years that have resulted from trusted insiders turning rogue or being compromised by perpetrators of APTs and the like indicates that there is a major disconnect when it comes to organi... (more)

A Guide to the CIO’s Toolbox By @Vormetric | @CloudExpo [#Cloud]

By Alan Kessler In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015... (more)

Why Tokenization Matters for Business By @Vormetric | @BigDataExpo [#BigData]

Tokenization: Why It Matters for Your Business By Ashvin Kamaraju Growing threats from both malicious and non-malicious insiders means data security should be an incredibly high priority for enterprises. As Vormetric’s 2015 Insider Threat Report noted, 44% of US organizations experienced a data breach or failed compliance audit in the last year. This is an alarming number, especially when one considers the amount of valuable data many companies store. With malicious actors becoming increasingly sophisticated, the answer is not to layer on additional endpoint and network securit... (more)