Data Masking as a Solution to Password Weaknesses Password-based data protection is the most common form of data protection, but it is increasingly weak. If you think your data is secure because your organization insists on strong passwords, you are increasingly likely to be wrong. Better software tools running on powerful processors can try millions of character...
February 09, 2017
Leave a comment
New Security Paradigm,
Breach,
Password,
Data Masking,
data privacy,
cyber threats
By CloudMask Team
Businesses and associations need to take a broader look at cybersecurity, ensuring that the tools they deploy now are still viable solutions in 2020. Cybersecurity is now an issue on everyone's radar, from businesses to governments to consumers. This is great news, as the world has finally realized just how vulnerable their personal and corporate data really is -...
October 18, 2016
Leave a comment
New Security Paradigm,
Data Masking,
data privacy,
cyber threats
By Tarek ElGillani
Data protection issues have come center stage as organizations move from legacy applications to those that store and manipulate data in a hybrid environment. Previously, IT security specialists sought to protect the boundaries of their networks and provide reliable perimeter security. Anything inside the perimeter was trusted and what was outside was not. This mindset led...
October 12, 2016
Leave a comment
New Security Paradigm,
Data Masking,
cloud computing
By CloudMask Team
Hackers will target organizations in an attempt to steal intellectual property, business strategies and other sensitive, mission-critical information. As cybercrime rapidly advances alongside the development of technologies in the business world, it is certain that hackers will target high-value organizations in an attempt to steal intellectual property, business...
December 12, 2015
Leave a comment
New Security Paradigm,
Breach,
Data Masking,
cyber threats
By CloudMask Team
If you look around, you will find hundreds of examples of data security being breached. Even large and well-established organizations with highly skilled and qualified staff and multiple layers of security are not safe. One just has to look at breaches at TJX Companies (94 million credit card details lost). Heartland Payment Systems (134 million credit cards exposed), RSA...
Cloud computing is providing substantial cost savings and scale benefits to most organization’s IM/IT resources, however, the area of benefits associated with cloud computing and its ability to enable collaboration, is often overlooked and underplayed. Cloud provides a significant competitive advantage for inter‐organizational collaboration. Specifically, this is...