Data Security Playoffs: Predicting the Next Breach
Posted on 20 January 2015 by
Pairing companies and simulating a Vegas-type point spread provides a great model for highlighting the winners vs. losers when it comes to securing data.
Posted on 20 January 2015 by
Pairing companies and simulating a Vegas-type point spread provides a great model for highlighting the winners vs. losers when it comes to securing data.
Posted on 27 January 2015 by
With the Internet of Things (IoT) fast upon us, the technology landscape is quickly evolving to be more connected, mobile, and pervasive. This evolution is entirely dependent on the emergence of a new breed of smart devices that will prove an incredible amount of insight into many aspects of our everyday lives. At the same […]
Posted on 23 February 2015 by
SafeNet solutions now give you the ability to encrypt sensitive workloads in the IBM SoftLayer cloud platform and own and manage your keys
Posted on 18 March 2015 by
“What are you trying to protect?” It’s a straightforward enough question perhaps, but it isn’t very easy to answer.
Posted on 30 March 2015 by
This post originally appeared on SafeNet’s The Art of Data Protection blog – now part of the Gemalto Digital Security blog. A lot can change in a year… and should. Unfortunately, since RSA Conference 2014, there have been over 2.13 billion data records lost or stolen according to the Breach Level Index. Only 4% of […]
Posted on 31 March 2015 by
If one of your acquaintances has a chronic condition, such as asthma or epilepsy or diabetes—one day, in the not too distant future, they may wear a smart device (IoT) that monitors their vitals. In the event that the data emanating from the device—and possibly processed in the cloud—would be indicative of an imminent crisis, […]