Securing the Breach, Part 6 – Control Access and Authentication…
Posted on 04 August 2014 by
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 04 August 2014 by
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 20 January 2015 by
Pairing companies and simulating a Vegas-type point spread provides a great model for highlighting the winners vs. losers when it comes to securing data.
Posted on 12 February 2015 by
Time changes everything. Unfortunately, in terms of breach occurrences, things didn’t improve in 2014.
Posted on 18 March 2015 by
“What are you trying to protect?” It’s a straightforward enough question perhaps, but it isn’t very easy to answer.
Posted on 30 March 2015 by
This post originally appeared on SafeNet’s The Art of Data Protection blog – now part of the Gemalto Digital Security blog. A lot can change in a year… and should. Unfortunately, since RSA Conference 2014, there have been over 2.13 billion data records lost or stolen according to the Breach Level Index. Only 4% of […]
Posted on 09 April 2015 by
In the last few years, encryption has become one of the shields used to protect the sensitive data organizations produce and are entrusted with by their customers. In 2013, in response to revelations about government surveillance and censorship concerns, companies like Google, Facebook, and Yahoo made public efforts to strengthen their encryption efforts. Google Inc. […]