enterprise

Smart mobility and the blockchain
Didier Benkoel-Adechy | | Automotive, Bitcoin, blockchain, Digital Identity, drivers license, encryption, enterprise, enterprise security, eSIM, identity verification service, Internet of things, iot, Mobile, SIM, smart mobility, smart proof, Trust, trusted digital identity
Can a consortium blockchain approach allow IoT industry players launch and secure new services such as car-sharing apps? ...

Controlling the Narrative: The Role of the Board of Directors
Kristi Perdue-Hinkle | | Board of Directors, Communications, Confidentiality, enterprise, inside informaton, Privacy, Proprietary Information, secure messaging
In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of ...

Tripwire Products: Quick Reference Guide
Megan Freshley | | Data Collector, DEVOPS, enterprise, IP360, log management, tripwire, Tripwire News, Tripwire Products
Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today, we’d like to offer a straight-forward ...

Choosing the Right Cloud HSM
Gary Marsden | | Cloud HSM, CloudHSM, encryption, enterprise, enterprise security, hardware security modules, hsm
Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in ...
Preventing Man-in-the-Middle Attacks
Kristi Perdue-Hinkle | | breaches, encryption, enterprise, hacks, interception, man in the middle attacks, MIITM attack, secure communications, security
When it comes to cyber security, sometimes the jargon can feel overwhelming. Ransomware, encryption, man-in-the-middle attacks… The Vaporstream blog has covered ransomware and encryption in the past, so today I wanted to ...

Recognizing the Best in Identity & Access Management: Gemalto Wins Best IAM Solution
Ariane Seiferth | | enterprise, enterprise security, iam, Identity & Access Management, SafeNet Trusted Access, single sign on
This week Gemalto was recognized at the 2018 Channelnomics Security Awards for Best Identity & Access Management offering for SafeNet Trusted Access. The Channelnomics Security Awards recognize the trailblazers in the security ...

Take Control of Your Cloud with Gemalto at GovWare 2018!
According to Gemalto’s 2017 Breach Level Index Report, publicly reported data breaches compromised more than 2.5 billion data records as a result of 1,765 security incidents throughout the year. North America made ...

New York State Cybersecurity Law: Encryption Deadline Coming September 3, 2018
Bob Louttit | | Compliance, encryption, enterprise, enterprise security, Multi-Factor Authentication, New York State Cybersecurity Requirements for Financial Services Companies, regulations
Financial Services companies operating in the State of New York have until September 3, 2018 to be in compliance with the new mandates of the New York State Cybersecurity Requirements for Financial ...

Data Breach Affects 1.5 Million Singaporeans
A government healthcare group database in Singapore suffered a data breach that compromised the personal information of 1.5 million people. On 4 July 2018, investigators with Integrated Health Information System (IHiS) detected ...
Five Tips for Business Continuity During a Disruption
Tali | | Business Continuity, business continuity plan, communication, communication plan, Disaster Recovery, disruption, enterprise
Aspects of business are so interconnected—from transportation to email to facilities management to data storage—that compromise or disruption of simply one aspect can affect the entire business. And such disruptions aren't limited ...