Earlier in 2020, hackers broke into SolarWind’s systems and added malicious code into the company’s “Orion” software system, used by […]
As we look back at 2020 and forward to the future, the ShardSecure team is fortunate to have marked critical […]
This post was initially published by our Senior Advisor, Robert Clyde, in InfoSecurity Magazine There has been relief around the […]
Pfizer has been in the news recently for several important reasons. Most recently and likely most significantly, due to their […]
Encryption has long been the one of if not the preferred method for securing the data stored on and shared […]
October marks the seventeenth annual National Cybersecurity Awareness Month as outlined by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). […]
As any organization tasked with storing and transmitting sensitive data knows, the associated compliance implications can be a minefield of complex rules, risks and expensive fines.
Last week, Bloomberg reported that hackers had managed to snag payment of 118 bitcoins (about $1.14M US at the time of the exchange) from Covid-19 researchers in early June.
Until recently, when it came to protection for cloud data, I considered encryption the primary method. Then a few months ago, I came across a new technology called microsharding which disrupted my viewpoint.
The global pandemic has also shone a spotlight on another type of highly sensitive data: vaccine research and associated medical records. As scientists across the globe search for a Coronavirus cure, data privacy and security have become a challenge all their own.
According to IDC Corp’s Worldwide Quarterly Cloud IT Infrastructure Tracker, total end user spending on IT products for public and […]
Over the last several weeks, organizations across the globe have scrambled to provide millions of employees with the tools necessary to work from home. For those employers for whom remote work has never been common practice, adapting for today’s conditions is not a matter of broadening existing security practices but of creating them on the fly. And the information at stake is some of the most sensitive traveling across the internet today.
Hardly a month into 2020, the cybersecurity news beat is already flush with headlines. One of the most notable came […]
There’s no doubt cloud adoption is becoming ubiquitous. The datasets and workloads that have been migrated to cloud versus those […]