Data protection is a complex challenge, and it demands attention at every level of an organization. PKWARE's in-house experts are here to help you stay up to date on best practices, emerging trends, and new resources for enterprise data security.
Six months ago, the New York State Department of Financial Services formally adopted a set of cybersecurity requirements for banks, insurance companies, and other financial services companies that operate in New York. These requirements, commonly known as NYCRR 500, represent the first real cybersecurity law in the United States. After an initial 180-day transition period, several of the law's provisions are now in effect.
Even when you know you’re doing things right, it’s nice to get external validation, especially when it comes from experts in the field. That’s why we’re thrilled to report that PKWARE is listed three separate times in the latest Gartner Hype Cycle Reports for Threat-Facing Technologies.
The Gartner report, which focuses on technologies that protect enterprise IT infrastructure against advanced cybersecurity threats, lists PKWARE by name in three categories: format-preserving encryption, enterprise key management, and database encryption.
The last two years have been challenging ones for organizations that do business in the UK. Last spring, when the UK was still part of the EU, the European Parliament adopted the General Data Protection Regulation, marking a fundamental shift in Europe's rules for collecting and processing personal data. Just two months later, UK voters passed the Brexit referendum, leaving companies and individuals in confusion as to which data protection laws would apply.
Now, with the recently-announced Data Protection Bill, the UK government is taking steps to define the country's post-Brexit approach to data protection. As expected, the new law will implement most of the GDPR's provisions regarding individual rights and corporate responsibilities. However, the UK will deviate from the GDPR in at least a few areas, potentially creating a second set of requirements for companies that operate both in the UK and on the continent.
These are exciting days at PKWARE.
On July 11, we launched Smartcrypt Data Discovery, one of our most significant product releases in recent history. With this enhancement, our already-unique Smartcrypt platform now lets customers take an entirely new approach to protecting their sensitive data.
Even as data breaches go, this one was ugly.
Deep Root Analytics, a data analysis firm hired by the Republican National Committee to profile voters during the 2016 presidential campaign, left sensitive information on nearly 200 million American citizens on an unsecured web server. The data—more than a terabyte in all—included potential voters’ home addresses, phone numbers, and birthdates, as well as details on their religious preferences and ethnic backgrounds. Anyone with the URL for the server could download the files without needing to enter so much as a password.
A complicated—and ultimately unnecessary—lawsuit is winding its way through the California courts this year, as Waymo and Uber clash over stolen trade secrets. Here are a couple of undisputed facts: a Waymo employee stole 14,000 documents from Waymo servers pertaining to self-driving car technologies, and Uber hired the former Waymo employee. Now Waymo accuses Uber of using those stolen documents, and wants the courts to shut down its self-driving car research. Unfortunately for Waymo, the courts ruled that the stolen documents don’t meet the standards for trade secrets—and that Uber can keep moving forward on self-driving car research.
Before it has funding, a marketing campaign, customers, or even an office, a startup has one all-important asset: information. In fact, you could say that every startup begins its existence as information itself, in the form of a codebase, a blueprint, a business plan, or some other form of intellectual property. As a company grows, it will collect vast amounts of new information in a variety of forms—customer data, transaction records, plans for additional products—all of which are critical to its survival and success.
Unfortunately, few startups recognize just how much protection their data requires. A strategy based on network and device security, no matter how sophisticated it might be, simply isn’t enough to keep data secure. Companies that fail to encrypt their data are taking an unnecessary risk that can rob them of their ability to grow and compete.
After months of delays, the Trump administration has issued its first executive order on cybersecurity, signaling the direction that the federal government’s new strategy will take. The order addresses three broad topics: the security of federal networks, protections for critical infrastructure, and cybersecurity for the general public. Among its calls to replace outdated technology and to create a more capable cybersecurity workforce, the order contains one directive that will make an immediate difference in how the government manages its cybersecurity programs.