<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

How to evaluate and select the best encryption services

Encryption is necessary after all, so the only discussions about this technology and these services should be about choosing a solution. When to comes to truly protecting data, encryption is a no-brainer. In fact, some industry regulations require that businesses and associations encrypt specific information. Health care is a great example of this, but organizations in...

The Myth of “Staying One Step Ahead of the Hackers”

The assumption that software security can stay ahead of the hackers is not true because the software security industry is always reacting to threats that hackers expose. Once hackers start exploiting a flaw in an application, security companies try to block the resulting threat by providing security updates for existing software or by developing new programs. Either...

Why Defense In Depth Is Not Good Enough

By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg For many years, information security professionals have discussed, and promoted, a strategy known as “Defense In Depth,” in which an organization utilizes multiple layers of security controls rather than just one layer, with the hope that if some vulnerability exists in one of the layers, the...

The Encryption That Businesses Need, But CISOs Forget About

By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg Many businesspeople put their firms’ data at risk because they fail to understand several important concepts about encryption. Simply understanding that data can be protected from unauthorized parties by encrypting it is insufficient to deliver security; in order to secure information people must know when...

Why Your Data Security Strategy Should Include Data Masking

Data Masking/Tokenization/Anonymization replaces sensitive information with fictitious data while retaining the original data format. The data masking process lets you continue to work with your data as if it were not encrypted. Databases, business applications and collaboration software continue to work as if the data was real, but unauthorized personnel only have...

I have “nothing to hide”! Why should I care about Government surveillance?

If you don't have anything to hide, then why would you object if the police come to your home to search and take pictures of your documents without your permission? Unfortunately for you as a consumer, the discussion regarding data protection is often focused on corporations and what they can do to prevent hackers from accessing mission-critical communications and...

Government backdoor: The basics of the plan to bypass encryption

The government want the ability to conduct surveillance on encrypted communications. No matter how much law firms invest in data loss prevention and information protection, the government wants to be able to access private, personal and corporate data whenever it wants. The Washington Post reported that for months now, federal law enforcement agencies and other...

Data Breaches: The Encryption Challenges

This article is the third in a series that discusses data breach threats and possible solutions. The first two articles, “What You Need to Know,” and “Threats and Consequences,” make it clear that businesses need to take action to reduce data breach risks. The current article presents encryption as a possible solution but details what type of encryption is needed to...

Is data manipulation the next step in cybercrime?

Data manipulation could mean disaster for corporations, health care providers, national security agencies and individuals around the world. Businesses and consumers both invest time and money into securing private information, but too often, the focus is on preventing hackers from accessing data and therefore ensuring that sensitive information, trade secrets and...

Anatomy of Password-based Data protection – Part Two

Data Masking as a Solution to Password Weaknesses Password-based data protection is the most common form of data protection, but it is increasingly weak. If you think your data is secure because your organization insists on strong passwords, you are increasingly likely to be wrong. Better software tools running on powerful processors can try millions of character...