Can hardware security modules (HSM) lower your insurance costs?

Can hardware security modules (HSM) lower your insurance costs?

|
Can hardware security modules (HSM) lower your insurance costs? brad-beutlich Wed, 10/14/2020 - 04:43 Have you ever heard of cyber liability insurance? If you haven’t, you will soon. In 2019, according to industry reports, about 47% of companies with revenues in excess of $1B in annual revenue are currently investing ... Read More
Are encryption keys more important than your data?

Are encryption keys more important than your data?

|
Are encryption keys more important than your data? brad-beutlich Mon, 05/18/2020 - 00:09 Today, more than ever, protecting data and systems is extremely important – corporate reputations, and in turn their business, can depend on it. There are many layers to data security and, for companies who rightly don’t trust ... Read More
For autonomous vehicles, there’s a difference between security and safety: part II

For autonomous vehicles, there’s a difference between security and safety: part II

|
For autonomous vehicles, there’s a difference between security and safety: part II brad-beutlich Wed, 11/13/2019 - 22:48 In part I of my blog, I discussed the advent of the modern-day automobile and the coming wave of autonomous vehicles. I noted the challenges and opportunities inherent in this budding technology. Here, ... Read More
For autonomous vehicles, there’s a difference between security and safety: part I

For autonomous vehicles, there’s a difference between security and safety: part I

|
For autonomous vehicles, there’s a difference between security and safety: part I brad-beutlich Wed, 11/13/2019 - 21:35 Self-driving or autonomous cars are coming. Whether the buying public likes it or not, they’re coming. The advantages are as clear today as they were when the automobile was poised to replace the ... Read More
Where’s the ROI in security?

Where’s the ROI in security?

|
Where’s the ROI in security? brad-beutlich Thu, 10/10/2019 - 23:11 Most companies cannot do much without someone asking, “What’s the return on investment for this purchase?” Those of us concerned about security are often trapped by this question. Some of us lie and come up with some elaborate formula that ... Read More
why HSM are different

Why HSMs are different than safes

|
Why HSMs are different than safes brad-beutlich Mon, 09/02/2019 - 23:35 The Great Pyramids of Giza in Egypt are probably the first safes ever constructed. They were built as tributes to and the final resting place of three Egyptian pharaohs. They had very complicated locking mechanisms that didn’t work since ... Read More
Protect the Key

Protect the key – or don’t bother encrypting your data

|
Protect the key – or don’t bother encrypting your data brad-beutlich Tue, 08/20/2019 - 05:41 Encryption has seen quite the evolution. The technology, which can be traced back to BC Mesopotamia, is on the cusp of entering into a quantum era. The one constant? While encryption solutions will change with ... Read More

Logging, Management and Analytics

Step 1 of 4

Currently, our log management solution is: