Wide-ranging attacks against Barracuda appliances linked to China
This week the news broke that Mandiant (an incident response firm) attributed the recent cyberattack campaign targeting customers utilizing Barracuda’s Email Security Gateway to hackers affiliated with the Chinese government. Barracuda had hired Mandiant to investigate the source of the attacks which exploited a critical vulnerability in Barracuda’s email filtering appliances. Barracuda seems to have […]
Goodbye, Tina Turner
Sad news this week that the Queen of Rock ‘n’ Roll has exited the stage. Many of us at the Randtronics team grew up hearing and being moved by Tina’s music that continued to evolve and stay fresh. Always cut a striking but gracious figure, Tina inspired us with the way she repeatedly overcame challenging […]
Don’t take an Uber to the Big House
In a groundbreaking development, the ex-security chief of Uber has been convicted for his failure to disclose a significant data breach that occurred at the well-known ridesharing company. This marks a historic moment as it is believed to be the first instance of a corporate executive being charged in connection with a cyberattack. A jury […]
Vormetric Migration Assessments at Minneapolis CyberSecurity Conference 17th May 2023
Are you a Vormetric DSM user attending the Minneapolis CyberSecurity Conference at the Sheraton Bloomington Minneapolis on 17th May 2023? We are offering a limited number of in-person Vormetric Migration Assessment review sessions during which our team will provide you an approximate assessment of scope, timeline and costs to migrate your environment. Want to understand […]
If encryption is a blindingly obvious protection against data breach – why isn’t every business already using it?
In todays’ world, businesses must take all necessary steps to protect their data and IT systems from cyber criminals. However, many companies are still falling short when it comes to implementing effective encryption-based protection. In this blog post, we will discuss five reasons why businesses have yet to adopt these security measures and what they […]
Why lose sleep worrying about your company suffering a data breach – when you can squash this risk using encryption?
In today’s digital age, it is essential that businesses take the necessary steps to protect their data and IT systems. Unfortunately, many organizations are not taking the correct measures to secure their online infrastructure, leaving them exposed to unnecessary risks. In this blog post, we will discuss why encrypting all IT systems is a must […]
Protecting Personal Data: The Growing Importance of Data Protection Laws
In today’s digital age, data is one of the most valuable assets an organization can have. It can be used to understand customer behavior, improve efficiency, and create new products and services. At the same time, however, the collection and use of personal data are becoming increasingly controversial. Individuals are growing more concerned about their […]
End-Point-Device Data Protection
Full-disk and volume encryption protects data if device is physically lost, but does nothing to protect data once a valid user has logged-on and encryption is essentially bypassed. Many organizations use full-disk and volume encryption products to protect the data content of end-point devices in the event that the device is lost or stolen. […]
Migration path for end-of-life Vormetric Data Security Manager customers.
On April 16th 2023, Thales announced Vormetric Data Security Manager products will cease to be sold from 30th June 2023, with support finishing 30th June 2024. Thales is encouraging its Vormetric customer base to migrate to its CipherTrust Security Platform that provides encryption and key management as part of broader package of data security products […]
Latitude Finance – Locking the garden gate
This month, the Australian financial services group, Latitude Financial, revealed a data breach that resulted in the personal details of up to 8 million customers being stolen. It’s common to hear public statements from companies that have suffered a breach claiming they were using encryption to show they take data privacy seriously. However, whether the […]