Blog

How to Implement Defense in Depth

The threat of cybersecurity breaches remains omnipresent for today’s cybersecurity professionals, for whom one false keystroke or under-protected storage location […]

Blog

ShardSecure + ISACA Webinar: Microshard™ Technology, Defense in Depth for Data

We were thrilled to have the opportunity to educate over 800 cybersecurity and compliance professionals last week when we partnered […]

Blog

DevOps Data Calls for New Data Obfuscation Strategies

As organizations have embraced DevOps to accelerate software development lifecycles, the need for access to production data has exploded accordingly. […]

Blog

Cybersecurity Insurance in the Cloud

With the cost of a data breach in the United States averaging $8.64 million, it’s not surprising tech stakeholders and […]

Blog

InfoSecurity: Questions Enterprises Should Be Asking as they Migrate to the Cloud

In this article, originally published by InfoSecurity, Robert A. Clyde outlines how to take a critical inventory of existing data […]

Blog

Microsharding: a New Method for Ensuring Data Protection

Encryption has long been the primary method of protecting data. Now, at a time when a convergence of factors is […]

Blog

ShardSecure’s Predictions for 2021

As we look back at 2020 and forward to the future, the ShardSecure team is fortunate to have marked critical […]

Blog

For Most Companies, Securing Remote Work is Unfinished Business

This post was initially published by our Senior Advisor, Robert Clyde, in InfoSecurity Magazine There has been relief around the […]

Blog

Protecting Critical Vaccine Research Data

Pfizer has been in the news recently for several important reasons. Most recently and likely most significantly, due to their […]

Blog

Data Privacy Beyond Encryption

Encryption has long been the one of if not the preferred method for securing the data stored on and shared […]

Blog

National Cybersecurity Awareness Month and Prepping for the Holiday Shopping Season

October marks the seventeenth annual National Cybersecurity Awareness Month as outlined by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). […]

Blog

Data Sensitivity in the International Data Governance and Security Landscape

As any organization tasked with storing and transmitting sensitive data knows, the associated compliance implications can be a minefield of complex rules, risks and expensive fines.

Blog

Ransomware Attacks Surge Amid Search for COVID-19 Cure

Last week, Bloomberg reported that hackers had managed to snag payment of 118 bitcoins (about $1.14M US at the time of the exchange) from Covid-19 researchers in early June.

Blog

Microsharding: An Innovative Way to Protect Cloud Data

Until recently, when it came to protection for cloud data, I considered encryption the primary method. Then a few months ago, I came across a new technology called microsharding which disrupted my viewpoint.

Blog

Accelerated Cloud Adoption: Vaccine Hacks Shed Spotlight on Data Privacy and Security

The global pandemic has also shone a spotlight on another type of highly sensitive data: vaccine research and associated medical records. As scientists across the globe search for a Coronavirus cure, data privacy and security have become a challenge all their own.

Blog

Public Cloud Adoption and Data Security Events: What can be done to split their joint trajectory?

According to IDC Corp’s Worldwide Quarterly Cloud IT Infrastructure Tracker, total end user spending on IT products for public and […]

Blog

Heightened Data Security Risks Follow as Millions of Employees Work from Home

Over the last several weeks, organizations across the globe have scrambled to provide millions of employees with the tools necessary to work from home. For those employers for whom remote work has never been common practice, adapting for today’s conditions is not a matter of broadening existing security practices but of creating them on the fly. And the information at stake is some of the most sensitive traveling across the internet today.

Blog

Why reducing data sensitivity is the best protection against cloud misconfiguration

Hardly a month into 2020, the cybersecurity news beat is already flush with headlines. One of the most notable came […]

Blog

How to protect against the #1 cause of cloud data breaches

There’s no doubt cloud adoption is becoming ubiquitous. The datasets and workloads that have been migrated to cloud versus those […]