Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Information Security: Compliance alone is ‘not enough’ for businesses

1/10/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtevmduvndi5l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Alan Kessler, president and CEO at data security firm Vormetric, says that as the issues surrounding data storage and privacy are discussed in the mainstream media, they’ll also feature more prominently in conversations between business leaders.

“One of the trends that we’re seeing that makes it quite exciting – not just for us, but of course for the industry as well – is that we’re seeing quite a few high-profile data security breaches and security, data protection and privacy are increasingly at the front and centre of important conversations at board level,” he says.

This is prompting companies to move beyond what the law requires them to do, he says. Firms are realising that it’s impossible to have perfect protection, and measures need to be taken in case criminals get inside and gain access to networks and data.

When Business Technology spoke to the Global Identity Foundation’s CEO Paul Simmonds, he suggested that one way to keep data more secure is to allow users to keep their own encryption keys, so if their solution provider is breached their data isn’t automatically compromised. Kessler says this is something Vormetric is paying attention to.

“It’s quite an area of interest,” says Kessler. “Our solution allows customers to actually control the key, so the service provider can manage the data but never see the data.

“In some cases customers are concerned about a state government coming to seek information from cloud service providers, wanting to see data held by their customers.

“With this type of approach where the individual user – the owner of the data – holds the key, the cloud service provider can give the data over to a government entity but the information will be cypher text – it will not be in clear text.”

That said, no number of security measures can make it absolutely impossible for what Kessler terms ‘adversaries’ – criminal, governmental or otherwise – to gain access to data. He argues that even those complying with regulations should be doing more.

This article has been extracted from http://business-technology.co.uk/, please click on this link to read the article in full http://business-technology.co.uk/2014/10/information-security-compliance-alone-is-not-enough-for-businesses/

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...