<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Why Defense In Depth Is Not Good Enough

By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg For many years, information security professionals have discussed, and promoted, a strategy known as “Defense In Depth,” in which an organization utilizes multiple layers of security controls rather than just one layer, with the hope that if some vulnerability exists in one of the layers, the...

Why the government isn't a fan of commercial encryption

Federal governments and major technology firms are arguing for or against encryption, respectively. But why? Due to recent political turmoil and devastating events overseas, the topic of end-to-end encryption has reentered public discussion. At the center of the debate, you have federal governments and major technology firms, each arguing for or against encryption. The...

The Encryption That Businesses Need, But CISOs Forget About

By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg Many businesspeople put their firms’ data at risk because they fail to understand several important concepts about encryption. Simply understanding that data can be protected from unauthorized parties by encrypting it is insufficient to deliver security; in order to secure information people must know when...

Should You Encrypt Data Before it Goes to the Cloud?

American cloud service providers such as Microsoft are opening local data centers in foreign countries at the request of the respective foreign governments and customers located in those countries. The thinking behind this strategy is that data located in a particular country is subject to the country’s data privacy laws, which may be different from those in effect in...

Where are your encryption keys and who has control over them?

All entities should ask “Who controls the key?” when using encryption services. Data breaches have become far too common, and as a result, the world is smartening up in regard to cybersecurity. While organizations have acquired and deployed numerous data protection tools and services, one method stands out from the rest: encryption. In fact, encryption is so powerful...

How to validate your data encryption solution?

Data encryption like a safe with a lock. Imagine if you had a big strong lock on the front door of your house. And inside, to protect your valuables, you had a big strong safe with all the latest security features. You’d probably feel pretty secure. You’d sleep well at night. Now imagine if the key to your front door and the key to your safe were one and the same key....

Cybersecurity Implementation for Health Care Records

Sensitive patient records held by healthcare organizations have to be stored and processed securely, both to guard the patients’ privacy and to comply with government regulations. As a healthcare provider responsible for patient information, you have to be able to detail what measures you are taking to safeguard patient data and you have to show that these measures are...

Tokenization, Encryption and Data Sovereignty...

Tokenization is the process of replacing a sensitive data element with a random equivalent, referred to as a token that has no extrinsic or exploitable meaning. The token is a reference that maps back to the original sensitive data through a tokenization system. Both original sensitive data and token are stored encrypted in a secure database. Reversing this process by...
1