What to Do Before Encrypting Your Data
Published on May 5, 2014
Encryption is worth doing the right way. Here are some things to think about for your company's encryption strategy. It's common knowledge among security professionals today that one of the most important components of any data security strategy involves encryption. Encryption is an incredibly powerful…
Protecting the Mainframe from Internal Security Threats
Published on April 22, 2014
Sometimes the threats we face aren't in the Cloud -- they're in the office with us. Many of the security issues we have discussed in this blog have revolved around protecting an organization's data against external threats. Hackers and other cyber criminals pose a risk…
Are You Making One of These Database Encryption Mistakes?
Published on January 22, 2014
Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…
Protecting Mission Critical Systems Through Data Encryption
Published on December 20, 2013
Of all the data security tools and techniques available, data encryption remains the most effective way to keep mission critical data secure and out of the wrong hands. Many large organizations today rely on mission critical technology. Mission critical can refer to any part of…
Who’s Already Using Encryption?
Published on December 17, 2013
If you're running a mainframe that stores and processes sensitive data, you already know about the importance of encryption to data security. However, even though data encryption is a proven way to keep data private, there are still many companies that are not using encryption…
From the Mainframe to the Cloud
Published on November 25, 2013
Part of the premise and promise of cloud computing is that organizations can deploy a system much more cheaply and manage it much more simply than if buying their own hardware and running their own data center. The conventional wisdom of cloud computing suggests building…
Big Data requires Big Security
Published on November 18, 2013
Every day, large organizations are flooded with the data generated in the course of doing business. Figuring out what to do with that data--how to leverage and benefit from it--as well as determining how to safeguard it are some of the hot topics emerging in…
Image Recognition – Multi-factor Security
Published on November 14, 2013
Do you recognize this image? As we've discussed before on this blog, multi-factor authentication is an essential part of a secure system. Passwords alone, even sufficiently complex ones, are useless if stolen. And other authentication methods like fingerprints are often not an ideal setup for…
Renewing Your Company’s Commitment to Security
Published on November 4, 2013
At one point, your company may have made the decision to take security more seriously. It might have been a strategic initiative, or it might have been in response to a past security breach. The CEO might have addressed the company or sent out a…
Making sense of security
Published on October 29, 2013
You and your team may understand the importance of encryption and data security, but that doesn't mean the people who write the checks get it yet. As a mainframe security professional, part of your job is making sense of the challenges of keeping the data…