Quantcast
Channel: Database Encryption – Data Security Blog | Thales eSecurity
Browsing latest articles
Browse All 22 View Live

Image may be NSFW.
Clik here to view.

Data Security Innovations

The pace of innovation in computer security continues unabated and, with the ever-increasing number of data security breaches, sovereign espionage a la Advanced Persistent Threats, and efforts to track...

View Article



Image may be NSFW.
Clik here to view.

Angrier, Smarter, Tougher Malware

Hang on everyone, it looks like it’s going to be a wild ride in 2014 on the malware front. Malware source code moved to be “open” in 2013.  As a result of this “open source” style —where building...

View Article

Image may be NSFW.
Clik here to view.

6 steps to preventing another massive breach like eBay’s

It seems pretty clear that eBay didn’t properly safeguard their user information. We can expect that perimeters and firewalls will be penetrated – The Verizon data breach report gives a 90% chance of...

View Article

Image may be NSFW.
Clik here to view.

General Availability of Application Encryption

The Vormetric Data Security Platform Yesterday was a big day for Vormetric, the culmination of the long process of creating a new product – Vormetric Application Encryption.  This offering is a major...

View Article

New tools for Defenders of Data – The Vormetric Data Security Platform 5.2.1...

Yesterday, we announced the general availability of Vormetric Data Security Release 5, Version 5.2.1.  This is a full release for our set of Data Security Platform products, including extensive...

View Article


Image may be NSFW.
Clik here to view.

Breakthrough Encryption Performance with Vormetric, Intel AES NI and MongoDB

Intel’s AES-NI instructions are extensions to the x86 instruction set to perform AES encryption and decryption directly using Intel CPUs. In addition to being more secure, there are significant...

View Article

Image may be NSFW.
Clik here to view.

Why a Data Security Platform Should be a Priority for Your Enterprise

When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact...

View Article

Image may be NSFW.
Clik here to view.

Database protection in the spotlight as driver details breached in the UK

Following a recent investigation by Sky News, it’s been revealed that PaymyPCN.net, a private firm which allows drivers to pay fines via its website and has a direct link to the Driver and Vehicle...

View Article


Image may be NSFW.
Clik here to view.

RSA DPM: What Do You Do When “End-of-Life” Hits?

I’ll grant you the topic sounds a little morbid, but it’s not what you think. I am referring to when an organization announces the end-of-life and subsequent end-of-product support for a product or...

View Article


Image may be NSFW.
Clik here to view.

To Go Native, Or Not to Go Native. A Cautionary Tale About Database Encryption

Enterprise databases house some of the most highly-sensitive, tightly-regulated data—the very data that is sought after by malicious insiders and external attackers. As a result, database encryption...

View Article
Browsing latest articles
Browse All 22 View Live




Latest Images