One billion–that’s how many records were breached in 2014 alone. Media headlines demonstrate every week that large Fortune 500 companies with very well-funded cyber security operations are now regularly losing valuable sensitive information. “Encrypting” data has been heralded as the panacea for protecting against these data loss scenarios. But is this really your greatest asset in the war against cyber crime?
When you lose something in the physical world, like your smartphone, you incur the cost and inconvenience of replacing it. However, if an attacker takes your data, nothing goes physically missing. Somehow, if you could only render that stolen data useless.
For hundreds of years, mankind has been able to make data secure by applying cryptographic codes only known to those with the “key” to read the contents. In the computer age, this has been the territory of geeks–doing work that is technically challenging, expensive, and requires special know-how. Few companies have found an affordable and easy-to-use way of encrypting data end-to-end.
IBM is a leader in cloud security. And in this blog, I want to introduce you to a revolutionary technology which has paved the way to a ‘Provable Secure’ encryption. Encryption should be a best practice for any security-conscious organization. While encryption does not stop access the information, it does make any stolen data unusable.
First, hear former Apple CEO John Sculley talk about cryptographic bit-splitting, the new ground breaking technology at the core of IBM Cloud Data Encryption Service, on Fox News.
IBM Cloud Data Encryption Services (ICDES) opens a new page in cloud security by providing an advanced data-centric protection for your information by leveraging a cryptographic bit-splitting technology. This highly efficient, kernel-level software combines data protection, data fault tolerance and simplified key management. ICDES goes beyond encryption with its unbreakable data protection and data resiliency capabilities and is not reliant on an administrative-heavy key management system.
ICDES is a powerful, easy to deploy and administer, and a low cost solution available from the IBM marketplace. You can learn about the solution there, watch demos and even take a free 30-day trial.
With the EU’s General Data Protection Regulation (GDPR) data regulation going into effect, we recently wrapped the latest GDPR Summit in London. Almost 500 attendees across most industries attended three parallel tracks of GDPR focused activity: GDPR program, HR and sales, and marketing. I was honored to give the keynote with my IBM colleague Jonathan […]
Smartphones put the whole world in the palm of users’ hands. They can manage their personal lives, interact with friends and social networks, and bank and shop online. But how can we know that our interactions and transactions are secure? Social networks, e-commerce companies and banks require user names and passwords, but according to Tech […]
The rate and sophistication of cyber security threats are growing daily, but security should not be a barrier to entry for enterprises on their cloud journey. More importantly, enterprises shouldn’t have to sacrifice application performance to enhance security. IBM and Cloudflare are working together to launch IBM Cloud Internet Services, a set of edge network […]