Organizations need to move away from spending money on perimeter security and instead focus on "protecting critical assets using encryption and key management," says Brad Beutlich, of Entrust. "At this point in time, the hackers cannot break encryption technologies," he adds.
Businesses want to reduce the complexity associated with encryption and key management in the cloud, according to a survey of more than 2,700 IT professionals conducted by Thales. Todd Moore, the company's vice president, encryption products, addresses the survey's biggest findings and takeaways.
Think your organization is ready to go passwordless? Check out our guide to your passwordless authentication rollout. Learn about the phases of the journey and what your first few weeks might look like.
To achieve transformative business objectives, stay competitive and meet user expectations, enterprises are undergoing a digital transformation, also known as modernization.
This shift to a decentralized, identity-centric operational model has placed increased importance on ensuring secure access for users. The...
Are ransomware-wielding criminals running scared? That's one likely explanation for the sudden release this week of free, master decryption keys for three different strains of formerly prevalent ransomware: Maze, Sekhmet and Egregor.
OMB on Wednesday released a federal strategy to move the U.S. government toward mature zero trust architectures. White House officials say the new strategy - with a focus on MFA, asset inventories, traffic encryption, and more - is a key step in delivering on Biden's May 2021 executive order.
U.S. President Joe Biden today signed a National Security Memorandum that aims to improve the cybersecurity of national security systems. The memo gives new powers to the NSA to oversee cybersecurity improvements such as the use of the multifactor authentication, encryption and endpoint detection services.
While organizations are increasingly adopting data encryption to ensure that data cannot be accessed even if a breach occurs, one challenge remains. Cloud providers often hold the encryption keys for their clients, giving them unfettered access to their data.
Download this eBook and learn how to:
Enterprises across industry segments are moving IT workloads and functions to the cloud, frequently ahead of any strategy or consistent capability to secure sensitive data. The advantages of cloud migration, such as scale, agility, and consumption-based pricing, are compelling.
This white paper describes the...
Allegiant characterizes itself as more of an e-commerce company than an airline, because 94% of its revenue comes through the website. As such, they needed another level of data security.
Download this case study to learn how Allegiant changed its security practices by:
Deploying Voltage SecureData with Secure...
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.
For most organizations, the rationale for employing data security solutions is crisis mitigation associated with potential data breaches - driven by compliance regulations, possible fines and reputation loss. There is, however, another compelling rationale for strong data security program that a growing number of...