Blog
The Power Behind Sidechain’s Managed Data Protection
Since its pilot launch in 2021, customers have been attracted to Sidechain’s Managed Data Protection service for one primary reason: to gain ironclad data protection with none of the operational complexity or...
Vormetric is going end-of-life and you have three options
Is your company still using Vormetric for data encryption? As the upcoming end-of-life of...
How to Choose a Vormetric Consultant
Customers across the globe have chosen Vormetric as their enterprise encryption solution to...
Why Cyberattacks Rise Around Holidays and How to Mitigate Them
Thanksgiving and the winter holidays are fast approaching, bringing tides of joy, holiday spirit,...
A Conversation on Data Security in the Cloud with Google’s Anton Chuvakin
It is essential to have an adequate program for data security in the cloud. Recently, I was a featured guest...
Three Pillars of Data Security in the Cloud
The cloud is a complex environment; there is no denying that fact. One of the most complicating aspects of...
Can You Trust the Cloud? Only If You Trust It Less.
It may not seem like it, but making decisions on cloud computing boils down to trust. Whether you are a...
Don’t lift and shift your data protection strategy to the cloud
Data protection for the cloud The data protection program you’ve relied on for years won’t be effective as...
Is Tokenization Right for your Data?
10 years ago, data-at-rest encryption was adequate for many data security needs. File encryption met most...
What is a digital fingerprint? Part 2
This is part 2 of the FAQ "What is a Digital Fingerprint?" If you haven't read part 1 yet, head over and...
What is a digital fingerprint? Part 1
Introduction Reading in the news about "digital fingerprints," and you come across several concepts: A...
Machine Identity: Sidechain Security’s Newest DevOps Integration at Venafi’s Global Summit
As the recognized leader in machine identity management, Venafi excels in securing machine-to-machine...
How to Protect Your Data with Google Cloud External Key Manager
Recently, Sidechain Security Founder and CEO Andrew Lance published his third in a line of joint whitepapers...
Scaling Certificate Management for Cloud-Native Innovations with Google CAS
The breakneck speed of technological innovation in the last decade has led to an explosion of...
The Shopify Copying Hack Lurking in the Shadows – Are You Prepared?
For many small business owners, Shopify has proven to be not only a lifejacket but a state-of-the-art speed...
A Conversation on Data Security in the Cloud with Google’s Anton Chuvakin
It is essential to have an adequate program for data security in the cloud. Recently, I was a featured guest...
Three Pillars of Data Security in the Cloud
The cloud is a complex environment; there is no denying that fact. One of the most complicating aspects of...
Can You Trust the Cloud? Only If You Trust It Less.
It may not seem like it, but making decisions on cloud computing boils down to trust. Whether you are a...
Don’t lift and shift your data protection strategy to the cloud
Data protection for the cloud The data protection program you’ve relied on for years won’t be effective as...
Is Tokenization Right for your Data?
10 years ago, data-at-rest encryption was adequate for many data security needs. File encryption met most...