Security

Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection

It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. That’s six months! On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.
Read more

Six tips for choosing the right data security solution for big data environments

Data is money. For some organisations, data has become the highest commodity, and this means consumers now hold the power. By gathering these large data sets, businesses can analyse human behaviour and interactions through trends, market patterns and associations which will fundamentally lead them to make business decisions to tailor experiences for consumers. Big data is big business and enterprises of all sizes are investing in data science and analytical platforms. Whenever data is mentioned, security should automatically follow; especially when you consider big data is everywhere – on-premise, in the cloud, streaming from sensors and devices, and moving further across the internet.
Read more

PROTECTING YOUR DATA: WHO IS RESPONSIBLE?

There are several different factors to consider when thinking about protecting your data. The subject can be complex and usually involves multiple parties. Let's begin with a simple thought exercise. Think about how much personal information you share on a day-to-day basis, online or otherwise. Consider who and what you interact with; applications, devices, websites, humans, corporations, etc. How much time do you spend thinking who has access to your data and what they could do with it? What are some of the things that you do to ensure you are protecting your valuable information?
Read more

Protecting your business with data-centric security on HPE NonStop

[vc_row][vc_column][vc_empty_space][vc_column_text]

Introduction

Did you know that HPE NonStop systems are present in over 50% of the Global 500 banks, at some of the largest retail payment processors in the world, and over 75% of the Global Telcos?

If we look at the kind of applications that run on HPE NonStop systems, it quickly becomes apparent that high volumes of mission-critical, sensitive data are routinely processed on HPE NonStop servers.…

Read more

From Hacker to Hackathon – History in the Making!

[vc_row][vc_column][vc_empty_space][vc_column_text]The year 2018 marked a very important milestone for our company, Gravic, Inc. We hosted our first-ever hackathon, and it was a major success. After months of planning, scheduling, coordination, and approval, we successfully hosted what has now become a highly anticipated annual event.

 

What do you think a hacker is?

What comes to mind when you hear the word hacker?…

Read more

Mercury Processing Services International Secures Growth with GDPR and PCI Compliant Data-Centric Data Protection Solution

[vc_row][vc_column][vc_empty_space][vc_column_text]Abstract
This article describes how Mercury Processing Services International (Mercury PSI) managed to address increasing regulatory pressure from PCI and GDPR data security and privacy requirements by implementing comforte’s SecurDPS Data Protection Suite. The solution provides encryption and tokenization capabilities and integrates transparently on HPE NonStop systems as well as on Windows, Unix and Linux. MPSI was able to secure all sensitive data on their systems without any impact on their high service levels.…

Read more

For Auto Makers, Data is the New Fuel for Analytics and Innovation

Auto manufacturers capture massive volumes of data that, with predictive analytics, can produce valuable insights to monetize, and improve products, operations, and better serve customers with new features. For example, connected cars can now report their health status to get ahead of maintenance and keep customers safer! Sensor data can be packaged and sold to transportation agencies and cities to aid in traffic design, road maintenance, and other initiatives.

Read more

Building Bulletproof Security for Your Hybrid Cloud

It’s been just about one year since the world learned about the Spectre and Meltdown microprocessor vulnerabilities, and a little over 18 months since the big WannaCry ransomware attacks of 2017. Those events were a serious wake-up call for many organizations. Companies are revisiting their security controls not only to ensure that they can counter threats, but also to make sure that they can recover quickly if their defenses are breached.

Read more

Data-centric security for the Enterprise

The General Data Protection Regulation (GDPR) is the most sweeping set of privacy regulations enacted by any governing body to date, in this case, the European Commission. The GDPR centers on the personal data of Data Subjects in the EU (and in the UK, which is honoring the GDPR even in the wake of Brexit) residing in the systems of any organization on the planet.

Read more

Modernizing breach defense for the manufacturing and automotive industries

Cutting-edge, interconnecting technology is being embedded into products at a rate never before seen. From coffee pots to cars, the IoT revolution is bringing great advances and conveniences to every day products. That said, it’s unfortunately also bringing a dramatic increase to the attack surface and potential vulnerabilities of those products.

When a coffee pot goes rouge, the risk is minimal, but when smart self-driving cars become a target, the potential damage is much greater.

Read more