The Thales-Gemalto Merger: What Does It Mean?

As a longtime player in enterprise key management infrastructure, we have been advocating for stronger encryption, authentication and key management for years. We have worked to educate the market on ...
Read more

Duty of Care and Information Security

The Hippocratic oath and the principles embodied in “duty of care” guide the daily actions of healthcare providers. But when it comes to information security and protecting sensitive PHI, is the healt...
Read more

The Two Network Security Tools Your Mid-Sized Business Needs

Encryption and authentication — let's learn more about why your company needs these security tools. Because IT staff and resources are often sparse within mid-sized businesses, they see the public clo...
Read more

DevSecOps Begins at the Application Layer

In the fast-moving world of DevOps, security sometimes got left by the wayside on the way to the next iteration. But today's threat landscape is so perilous that developers need to have solid security...
Read more

Automating Data Protection Across the Enterprise

Introduction With the unabated growth of the internet, companies are being challenged to protect unprecedented quantities of data from determined and targeted attacks. While security regulations manda...
Read more

The Two Most Important Steps to Keep Your Data Secure

Although we all recognize that keeping our data safe is important and encryption is something we've probably heard about, how many of us really understand what that means? I know I'm learning more eve...
Read more

Why Software Remains Insecure—and Why It Really Shouldn't

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more in...
Read more

Do Cryptographic Keys Belong in The Cloud?

Thanks to the cloud, organizations of all sizes can enjoy scalability, ease of use, and significant savings by outsourcing hardware and software ownership and maintenance in multi-tenant environments....
Read more

Mid-Sized Healthcare Organizations Need Enterprise-Sized Security

Mid-sized healthcare facilities are facing serious network threats. For instance, an Osterman Research report revealed that the healthcare industry is exceptionally vulnerable to ransomware. The repor...
Read more

3 Ways to Get a Head Start in the Age of Privacy

There is a lot to think about with the impending Age of Privacy hanging over all of us. As written in Corporate Compliance Insights, there are three key steps to take when considering how to improve y...
Read more