Earlier, I laid out the fundamental pillars of data trust and discussed the common qualities shared by different stakeholders with diverse definitions of trust. Understanding this context is critical to address the rapidly growing crisis… Continue Reading →
In my opening remarks, I introduced the four pillars of data trust—security, privacy, accountability, and integrity—along with the perceptions and expectations of diverse stakeholders across an organization. In this post, I will examine the common… Continue Reading →
Continue Reading →
Ionic Encrypted Search (IonES) system is a lightweight and scalable multi-user searchable encryption solution that enables users to search and retrieve protected documents in a provably secure way. Sign up for a private beta today.
Continue Reading →
Adam Ghetti, founder and chief technology officer of Ionic Security, discusses how establishing trust in a digital world can cause paralysis. He defines data trust– as the intersection of security, privacy, accountability, and integrity– and outlines how diverse business stakeholders perceive trust.
Faced with rapid digital transformation, security and risk management professionals are tasked with implementing new paradigms to both mitigate risk and reap the rewards of our increasingly connected world. Digital trust is complex, exponential, and… Continue Reading →
Trust is a thorny topic. You and I might agree that trust is essential—from human relationships, to business transactions, to simply driving down the street—and yet we might disagree about, or be unable to clearly… Continue Reading →
Recently, the San Francisco Chronicle published an open invitation from House of Representatives Energy and Commerce Committee Chairman Greg Walden (R-OR) to Silicon Valley CEOs requesting them to testify before the panel and discuss “disruptive… Continue Reading →
Many enterprises now think ‘cloud-first’ when it comes to their IT strategy and software footprint. Cloud adoption has increased steadily over the last decade to the point where recent surveys now show a majority of… Continue Reading →
Trusting No OneIn 2009, Forrester introduced the concept of Zero Trust, warning that the traditional perimeter-based security approaches were becoming ineffective and even dangerous in a world where data rapidly proliferates beyond those barriers.1 Years… Continue Reading →
The end of the year is approaching and planning for the final risk assessment and 2018 audit plan will start soon. With penalties of up to 4% of world-wide revenue, General Data Protection Regulation (GDPR)… Continue Reading →