night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Stop the Madness – Get off the Data Breach Train
Stop The Madness – Get Off The Data Breach Train

Back in April 2013, we investigated the motivations behind IT security spending. Our global online survey, targeted at IT professionals, found that newer IT trends – such as…

Read More
Big Data – Ensuring Compliance with “Least Privilege” and “Country of Origin”
Ashvin Kamaraju
Big Data – Ensuring Compliance With “Least Privilege” And “Country Of Origin”

Big data analytics are proving a boon to business and government, enabling organizations to analyze whole sets of related data or data from disparate sets, for patterns and…

Read More
Weak Passwords Let Retailers Down - Again

Research from earlier this year revealed that the worst consumer password of 2013 was ‘123456’. Recent headlines around the BrutPOS botnet identified by FireEye this week…

Read More
Next Step Beyond Compliance – Risk Management
Andy Kicklighter
Next Step Beyond Compliance – Risk Management

Vormetric has now reached 1400 customers worldwide, with strong deployments in place and expanding throughout the US, Europe and Asia / Pacific regions.  In the vast majority…

Read More
Global risk mitigation: Using encryption to avoid data breach fallout
Phil Lee
Global Risk Mitigation: Using Encryption To Avoid Data Breach Fallout

When thinking about data encryption, businesses typically view this as a proactive measure to avoid security breaches.  Naturally, this is correct – data that's encrypted is…

Read More
Making Compliance A Useful Cyber Security Tool
Making Compliance A Useful Cyber Security Tool

It was Albert Einstein who defined insanity as: “Doing the same thing over and over again and expecting different results.” But, yet again, the Government (e.g., the Cyber…

Read More