Encryption
Jan-Feb 2021
Jan-Feb 2022
Jan-Feb 2023
Jan-Feb 2024
Jan-Feb 2025
Jan-Feb 2020
July-August 2021
July-August 2022
July-August 2023
July-August 2024
July-August 2025
July-August 2019
July-August 2020
March - April 2021
March - April 2022
March - April 2023
March-April 2024
March- April 2025
March-April 2020
May - June 2021
May - June 2022
May-June 2023
May - June 2024
May-June 2025
May-June 2019
May-June 2020
Nov-Dec 2020
Nov - Dec 2021
Nov-Dec 2022
Nov-Dec-2023
Nov - Dec 2024
Nov-Dec 2025
Nov-Dec 2019
Sept - Oct 2021
Sept – Oct 2023
Sept - Oct 2024
Sept-Oct 2025
Sept-Oct 2020
Sept-Oct 2019
Nonstop Trends and Wins
Justin Simonds
The Power Duo Safeguarding Enterprise Data at Rest: HPE NonStop Encryption and Utimaco Enterprise Secure Key Manager
Manish Upasani
comforte and ACI Worldwide Partner to Help with Enabling PCI DSS 4.0 Compliance by March 2025
Thomas GloerfeldIn a significant move towards enhancing payment data security and achieving compliance with the latest PCI DSS standards, ACI Worldwide has announced a strategic partnership with comforte AG, a global leader in data protection and compliance solutions. This collaboration aims to empower ACI’s customers to seamlessly transition to PCI DSS 4.0 standards by March 2025, ensuring robust security measures for payment transactions.
From Compliance to Resilience: Strengthening Cybersecurity in a Changing Threat Landscape
Greg Swedosh (CISSP)
NonStop Trends & Wins
Justin SimondsIceFire is standard-fare ransomware. It is a kind known as ‘big-game hunting’ (BGH) ransomware. What is BGH ransomware? It is a kind of ransomware that is characterized by a double extortion model that targets large enterprises, using numerous persistence mechanisms. It is very hard to detect since it covers it tracks by deleting log files.
How to Build a Successful Cloud Security Strategy
Thomas Gloerfeld
You are Responsible for Data Security in the Cloud
Thomas GloerfeldCloud computing is the fuel powering modern digital transformation. Across the globe, organizations invested heavily during the pandemic to adapt to new market conditions, drive more efficient business processes and support mass home working. It’s estimated that 60% of corporate data globally is now stored in the cloud, and much of this will be in public cloud data centres.
Data is the Lifeblood of your Organization
Thomas GloerfeldData is pretty crucial to any business these days. Many people claim that data is the most important asset you can possess, with more utility than capital assets and more meaningful (though often latent) insights than a host of human capital. Data reflects your entire business: your intellectual property, your industry, the broader market trends, the pain points and needs of prospective customers, and your existing customer base.
Psst! Compliance Isn’t the Goal!
Marty Edelman
PCI DSS 4.0
Steve TcherchianSince the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new templates and supplements, including the “Migrating from SSL and early TLS Information Supplement” in April 2015 which highlighted the risks of SSL and TLS 1.0. The supplement described a migration plan as well as set a migration deadline of 1 July, 2016.
Security Spotlight
comforteHolistic security means more than just implementing one tool, one method, one solution, or one process to protect your business’s data. It means exploring every avenue to implement a multi-pronged defensive strategy and never depending on just a single security tool or solution. Organizations that follow more holistic approaches to security are the ones best positioned to remain in compliance with internal and regulatory mandates and to prevent breaches or unauthorized access to sensitive data. They’re the ones who can best protect their intellectual property, their brand reputation, and their customers’ most sensitive data.
