Application Development: Ripe for Encryption

As businesses look to accelerate application innovation and move more and more workflows to the cloud, their needs can be at odds with the need to secure the data. This article will outline current challenges faced by application developers to protect data in this new cloud/DevOps environment. It will also provide insights […]

The Future of Database Encryption

In order for encryption to be more broadly deployed, it must become easier to consume and interfere less with how applications process data. CIOs and  CISOs are starting to recognize that database encryption is a critical need and are scrambling to adopt it before their organizations  fail the next compliance […]

Cloud-based databases need new approaches to ensure data security

Interest and adoption of cloud-based databases is ramping up as more companies see the value of moving from traditional on-premise IT infrastructures to off-premise cloud services like Amazon (AWS), Microsoft Azure and many others. Database-as-a-Service (DBaaS) offers high availability, multi-tenancy and the ability to scale as demand grows without the […]

Why insider threats are the next big security challenge

The high-profile leaks of highly sensitive data by NSA contractors Harold Thomas Martin and Edward Snowden woke enterprises up to the fact that traditional perimeter security is not enough. In its 2016 Cyber Security Index, IBM Security found that 60% of breaches were caused by insiders either as inadvertent actors compromising their […]

Baffle: Making Application and Database Encryption Easy

There is nothing worse than having a solution to a problem that people don’t know they have. That may be the classic definition of database encryption. The challenge is that most databases have their own baked-in encryption model. As a result, most organizations just assume that they have all the […]

Encryption Key to Compliance Requirements as Companies Move to Cloud

The expansion of compliance requirements for data that is not in a customer’s on-premise environment is inevitable. Is your company ready? As we start the New Year, security remains a top enterprise concern. And why not? Data breaches are becoming bigger, bolder and more widespread than ever. Thanks to high […]

End-to-End Encryption a Recipe for Serenity

Data breaches litter the news cycle. There is a new, even worse breach garnering front page coverage on what seems like a daily basis. With such a threat-rich environment, it is mission critical to ensure your business does not become yet another notch on a hacker’s belt and fodder for […]