Blog

How to Choose a Vormetric Consultant
Customers across the globe have chosen Vormetric as their enterprise encryption solution to protect data at rest. While it is a powerful solution, it also requires expert knowledge to properly administer and...
Hostage Rescue: How to Respond If Your Business Falls Victim to Ransomware
Ransomware needs no introduction. In 2021, it has been on the tips of the tongues of government...
5 Things to Consider When Preparing Your Vormetric-to-CipherTrust Migration
As an IT or security pro, you've likely encountered this situation. You spend scarce budget...
Biden’s Message: Despite Urgent Need, U.S. Faces Cybersecurity Expert Shortage
In a first-of-its-kind summit for the industry, leaders of private companies in key sectors of the...
Scaling Certificate Management for Cloud-Native Innovations with Google CAS
The breakneck speed of technological innovation in the last decade has led to an explosion of...
The Shopify Copying Hack Lurking in the Shadows – Are You Prepared?
For many small business owners, Shopify has proven to be not only a lifejacket but a state-of-the-art speed...
A Conversation on Data Security in the Cloud with Google’s Anton Chuvakin
It is essential to have an adequate program for data security in the cloud. Recently, I was a featured guest...
Three Pillars of Data Security in the Cloud
The cloud is a complex environment; there is no denying that fact. One of the most complicating aspects of...
Can You Trust the Cloud? Only If You Trust It Less.
It may not seem like it, but making decisions on cloud computing boils down to trust. Whether you are a...
Don’t lift and shift your data protection strategy to the cloud
Data protection for the cloud The data protection program you’ve relied on for years won’t be effective as...
Is Tokenization Right for your Data?
10 years ago, data-at-rest encryption was adequate for many data security needs. File encryption met most...
What is a digital fingerprint? Part 2
This is part 2 of the FAQ "What is a Digital Fingerprint?" If you haven't read part 1 yet, head over and...
What is a digital fingerprint? Part 1
Introduction Reading in the news about "digital fingerprints," and you come across several concepts: A...
Protecting Your Small Business from Ransomware May Support National Security
It is not often the White House calls on the private sector to help protect national security. That is...
DevSecOps: What It Is and Why Should You Care
In light of recent high-profile supply-chain attacks and other cybersecurity events - SolarWinds, Colonial...
Machine Identity: Sidechain Security’s Newest DevOps Integration at Venafi’s Global Summit
As the recognized leader in machine identity management, Venafi excels in securing machine-to-machine...
How to Protect Your Data with Google Cloud External Key Manager
Recently, Sidechain Security Founder and CEO Andrew Lance published his third in a line of joint whitepapers...
Scaling Certificate Management for Cloud-Native Innovations with Google CAS
The breakneck speed of technological innovation in the last decade has led to an explosion of...
The Shopify Copying Hack Lurking in the Shadows – Are You Prepared?
For many small business owners, Shopify has proven to be not only a lifejacket but a state-of-the-art speed...
A Conversation on Data Security in the Cloud with Google’s Anton Chuvakin
It is essential to have an adequate program for data security in the cloud. Recently, I was a featured guest...
Three Pillars of Data Security in the Cloud
The cloud is a complex environment; there is no denying that fact. One of the most complicating aspects of...
Can You Trust the Cloud? Only If You Trust It Less.
It may not seem like it, but making decisions on cloud computing boils down to trust. Whether you are a...