External hackers and insider threats. Customer expectations and government mandates.
Data protection is a complex challenge, and it demands attention at every level of an organization. PKWARE's in-house experts are here to help you stay up to date on best practices, emerging trends, and new resources for enterprise data security.
Now that the first real cybersecurity law in US history is on the books, can we expect to see more of the same?
New York’s cybersecurity law for the financial services industry, 23 NYCRR 500, took effect on March 1. The law is making headlines not because it creates a heavy new burden for compliance, but because it takes a broader view of information security than any previous state or federal law. As a highly visible attempt to set priorities and minimum standards, the New York regulations have the potential to influence the long-term direction of cybersecurity legislation in the United States.
We're pleased to announce that once again, PKWARE has earned recognition as one of the world's most influential and innovative cybersecurity companies. The latest edition of the Cybersecurity 500, published by Cybersecurity Ventures, ranks PKWARE among the top information security firms worldwide.
In May 2018, the European Union’s new General Data Protection Regulation will take effect, forcing companies that do business in the EU to comply with strict new standards for data privacy and security. While it won’t have the force of law for another 14 months, the GDPR is already influencing data protection strategies around the globe.
Sometimes, an organization’s biggest information security headaches come not from the ill-intentioned, but from employees who are trying to do the right thing. As companies and government agencies create and exchange unprecedented volumes of sensitive data, uncontrolled or “runaway” encryption is becoming a serious concern for organizations around the world.
In a world of proliferating cyber threats and constant data exchange, encryption continues to gain visibility as the single most important tool for long-term information security. In fact, a recent report from Forrester named data encryption as one of the top global cybersecurity trends for 2017. Now more than ever, individuals and businesses are looking for ways to use encryption to keep their sensitive information safe from data thieves, spies, and other cyber threats.
The DDoS attack that crippled such major sites as Twitter, Paypal, Netflix and Reddit last week shifted the world's attention to the so-called Internet of Things (IoT).
Security experts have discussed the IoT as a target for some time, but the coordinated assault against Dyn, one of several companies hosting the the Domain Name System (DNS), brought the dangers into clearer focus.
To better understand what we're dealing with, a deeper dive into the IoT is necessary. Here's a look at how it works, where the vulnerabilities are, and what can be done to improve the security behind the technology.
Companies responsible for complying with the European Union's General Data Protection Regulation (GDPR) have a lot of uncertainty to process. From Brexit to the demise of Safe Harbor and the unfolding Digital Single Market (DSM), questions abound over how to proceed with compliance efforts.
What follows is a breakdown of these developments and a suggestion for the way forward.