Blog

Sidechain Security Announces Two New Customers in the Retail Sector
December 12, 2022 Portland, USA – Monday, December 12, 2022 – Sidechain Security, a leading provider of data security strategy and services, today announced that it has expanded its customer base across the retail...
Vormetric is going end-of-life and you have three options
Is your company still using Vormetric for data encryption? As the upcoming end-of-life of...
How to Choose a Vormetric Consultant
Customers across the globe have chosen Vormetric as their enterprise encryption solution to...
Why Cyberattacks Rise Around Holidays and How to Mitigate Them
Thanksgiving and the winter holidays are fast approaching, bringing tides of joy, holiday spirit,...
Protecting Your Small Business from Ransomware May Support National Security
It is not often the White House calls on the private sector to help protect national security. That is...
DevSecOps: What It Is and Why Should You Care
In light of recent high-profile supply-chain attacks and other cybersecurity events - SolarWinds, Colonial...
Machine Identity: Sidechain Security’s Newest DevOps Integration at Venafi’s Global Summit
As the recognized leader in machine identity management, Venafi excels in securing machine-to-machine...
How to Protect Your Data with Google Cloud External Key Manager
Recently, Sidechain Security Founder and CEO Andrew Lance published his third in a line of joint whitepapers...
Scaling Certificate Management for Cloud-Native Innovations with Google CAS
The breakneck speed of technological innovation in the last decade has led to an explosion of...
The Shopify Copying Hack Lurking in the Shadows – Are You Prepared?
For many small business owners, Shopify has proven to be not only a lifejacket but a state-of-the-art speed...
A Conversation on Data Security in the Cloud with Google’s Anton Chuvakin
It is essential to have an adequate program for data security in the cloud. Recently, I was a featured guest...
Three Pillars of Data Security in the Cloud
The cloud is a complex environment; there is no denying that fact. One of the most complicating aspects of...
Can You Trust the Cloud? Only If You Trust It Less.
It may not seem like it, but making decisions on cloud computing boils down to trust. Whether you are a...
5 Things to Consider When Preparing Your Vormetric-to-CipherTrust Migration
As an IT or security pro, you've likely encountered this situation. You spend scarce budget resources and...
Biden’s Message: Despite Urgent Need, U.S. Faces Cybersecurity Expert Shortage
In a first-of-its-kind summit for the industry, leaders of private companies in key sectors of the U.S....
5 Things Your Business Can Do to Cut Ransomware Risk by 90%
Over the July 4th weekend, a cyber-breach on an IT services company in Miami led to a “colossal” ransomware...
SoulKu Case Study: The Benefits of a Cybersecurity Partner
While recent high-profile cyberattacks like the SolarWinds hack and Colonial Pipeline fiasco might lead you...
Protecting Your Small Business from Ransomware May Support National Security
It is not often the White House calls on the private sector to help protect national security. That is...
DevSecOps: What It Is and Why Should You Care
In light of recent high-profile supply-chain attacks and other cybersecurity events - SolarWinds, Colonial...
Machine Identity: Sidechain Security’s Newest DevOps Integration at Venafi’s Global Summit
As the recognized leader in machine identity management, Venafi excels in securing machine-to-machine...
How to Protect Your Data with Google Cloud External Key Manager
Recently, Sidechain Security Founder and CEO Andrew Lance published his third in a line of joint whitepapers...
Scaling Certificate Management for Cloud-Native Innovations with Google CAS
The breakneck speed of technological innovation in the last decade has led to an explosion of...