Our first developer event was just announced! Workshop Description This two-hour hands-on workshop is designed to get developers up and running with the Machina Tools C++ SDK. Participants will spend a significant portion of the workshop with their hands on the keyboard, learning by doing….
Blog
71 Results Found - Page 9 of 9
2016 #InternetTrends Report: Data Security & Management as a Platform
Yesterday, Mary Meeker at Kleiner Perkins Caufield Byers (KPCB) unveiled the hotly anticipated 2016 Internet Trends Report at the CODE Conference in California. The report has a wide range, including trends from the rate of global smartphone user growth to re-imagining human-computer interfaces. It concludes with a…
The Trichotomy of National Security, Data Privacy, and Data Protection
This post isn’t about a person’s right to privacy, and it isn’t about a corporation’s need to protect its data. It does, however, have everything to do with solving the underlying data security problem facing citizens, businesses, and governments in today’s cloud-heavy, borderless world. Before…
The Cloud, Regulations, and PII
In late July 2014, with very little fanfare, the International Standards Organization (ISO) published ISO/IEC 27018. The standard outlines controls and guidelines for implementing Personally Identifiable Information (PII) protection for public cloud computing environments. ISO 27018 builds on the existing ISO/IEC 27001 and ISO/IEC 27002 frameworks for information security systems….
Data Proliferation in a Bordered World
Data has to be ubiquitous. It is borderless in a bordered world. With the Right to be Forgotten, the European Court of Justice’s decision on Safe Harbor, and the EU General Data Protection Regulation (GDPR) on the horizon, we are at risk of seeing a…
MiTM Attacks & SSL Pinning: What is it and why you should care.
In July of 2014, Google was on the hot seat for a serious security vulnerability found in its Gmail app for the iOS platform. Lacoon Security reported that the app failed to include SSL pinning, exposing encrypted Gmail communications to “Man in the Middle” (MiTM)…
DLP Paradox
For those who have figured out how to make their data loss prevention programs effective, the rewards are great. Yet the paradox remains: while DLP is valuable in changing insecure employee behavior, it does so by limiting employee activity and is completely bound by the…