Legacy Data Encryption Solutions Were Never Designed to Protect Data in Use.
Why Protecting Data at the Application Level is so important.
Data has never been more plentiful or more valuable, nor has it ever been more at risk from breach. Though hundreds of […]
Implementing Tokenization Shouldn’t Be So Damn Hard
What surprised us in a recent inquiry with a leading global analyst firm was not the fact that they had seen an […]
New survey reveals many companies do not encrypt data in use, but plans are in the works to address this security gap.
The majority of data breaches today are occurring at the application layer where sensitive information is more exposed and susceptible, however a […]
Happy 2^3×5!!! Prime Factors turns 40!
The year was 1981. It was a Wednesday, the first day of April. President Reagan was in the hospital recovering from gunshot […]
Psst… Don’t Look Now, but Your Sensitive Data is Showing.
I always find it interesting when our perceptions of how things work do not match up with reality. We were in a meeting not long ago with a large customer, discussing their encryption deployment, […]
Subpoena-Proofing Data in the Cloud
“…to subpoena-proof the cloud!” We had asked one of our largest customers what they were looking to accomplish with the deployment of our […]
Encryption: The Cost, The Protection, and the ROI
It’s no longer only the concern of governments and corporations: encryption is both lock and key to cybersecurity across a range of […]
Dropbox in Healthcare: What File Sharing Means for Patients
Cloud sharing is on everyone’s mind, even though some people still don’t really understand what it is. It often helps to put […]
HITECH vs. HIPAA: What You Need to Know
HIPAA and HITECH rules are often discussed together for a number of reasons, and it makes sense because one is meant to […]