Securing the Breach, Part 2 – A Three Step Strategy…
Posted on 01 April 2014 by
Find out the three steps that every company should take to mitigate the overall cost and adverse consequences that result from a security breach.
Posted on 01 April 2014 by
Find out the three steps that every company should take to mitigate the overall cost and adverse consequences that result from a security breach.
Posted on 16 April 2014 by
In the third installment of Securing the Breach, we take a closer look at the types of data that need encryption, and specifically “data at rest.”
Posted on 17 April 2014 by
The Heartbleed vulnerability once again reinforces the importance of using a hardware security module for cryptographic key storage and management.
Posted on 09 July 2014 by
SafeNet ProtectFile now includes the transparent and seamless encryption of sensitive data-at-rest in Apache Hadoop clusters.
Posted on 17 October 2014 by
An inmate is about to escape prison without lifting a finger. Learn how an IoT vulnerability in the PLC systems used by prisons makes that possible.
Posted on 23 October 2014 by
This post originally appeared on SafeNet’s The Art of Data Protection blog prior to Gemalto’s acquisition of SafeNet. I scanned the street from my window, looking for anyone who may be out of place. The streets were empty, even for this hour. With a push of a button my car, which had been parked a […]