Securing the Breach, Part 4 – Risk in the Fast…
Posted on 19 May 2014 by
In the fourth part in our Securing the Breach series, we explore why high speed encryption is crucial for protecting sensitive data in motion.
Posted on 19 May 2014 by
In the fourth part in our Securing the Breach series, we explore why high speed encryption is crucial for protecting sensitive data in motion.
Posted on 22 July 2014 by
To ensure security, organizations must establish a centralized policy around the protection, storage, back-up and organization of encryption keys.
Posted on 04 August 2014 by
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 18 November 2014 by
After collecting publicly available information about worldwide data breaches, the Breach Level Index (BLI) showed that there were over 183 million data records lost or stolen from July through September 2014. As our new infographic shows, that means there were nearly 2 million records lost or stolen every day. That’s 23 records a second. Of the […]
Posted on 20 January 2015 by
Pairing companies and simulating a Vegas-type point spread provides a great model for highlighting the winners vs. losers when it comes to securing data.
Posted on 27 January 2015 by
With the Internet of Things (IoT) fast upon us, the technology landscape is quickly evolving to be more connected, mobile, and pervasive. This evolution is entirely dependent on the emergence of a new breed of smart devices that will prove an incredible amount of insight into many aspects of our everyday lives. At the same […]