Securing the Breach, Part 1 – Accept It, Then Protect…
Posted on 18 March 2014 by
In our six-part series, ‘Securing the Breach’, we will take you on a journey – starting with the current state of data security and how we got here.
Posted on 18 March 2014 by
In our six-part series, ‘Securing the Breach’, we will take you on a journey – starting with the current state of data security and how we got here.
Posted on 30 March 2015 by
This post originally appeared on SafeNet’s The Art of Data Protection blog – now part of the Gemalto Digital Security blog. A lot can change in a year… and should. Unfortunately, since RSA Conference 2014, there have been over 2.13 billion data records lost or stolen according to the Breach Level Index. Only 4% of […]
Posted on 06 June 2016 by
As part of our ten-year anniversary, we take a look can at how cyber security has changed over the past decade.
Posted on 09 February 2016 by
Even though the Fraternal Order of Police (FOP) website apparently harbored sensitive data such as police officer contracts and officer-to-officer correspondence, it was likely never required to ensure strong encryption to protect its sensitive data nor strong authentication to secure member access.
Posted on 08 February 2016 by
If you will be at the RSA Conference at the Moscone Center in San Francisco, CA from February 29th – March 4th, make sure to stop by the Gemalto booth, #4108, in North Hall to learn about how we can help your organization Secure the Breach in three steps – encrypting your sensitive data, managing your encryption keys, and regulating access to your data and applications.
Posted on 27 April 2015 by
If there is one thing we can take away from this year’s RSA Conference it’s this: We do not have a technology problem, we have a mindset problem. There are plenty of very good security technologies available today, and walking around the RSA Conference show floor you really got a sense of the sheer volume […]