Portability, versatility, efficiency, and cost-effectiveness are just a few of the advantages of moving to virtualized environments. Instead of requiring a data center full of equipment, virtualization lets organizations rely on just a few servers. A smaller footprint equals less power consumption, lowered cost of ownership, and less overhead. However, too often, enterprises neglect security when it comes to implementing virtualization. Now, VMware makes it possible to easily encrypt and manage virtual machines (VMs) in minutes.Read more
How Key Management, PKI Controls, and Zero Trust Principles are Applied to Thwart Advanced Persistent Threats (APTs)
For years, cybersecurity professionals argued the importance of “zero trust networks” and their concerns have been fully validated in the wake of the SolarWinds incident. Hacking techniques likely used in the SolarWinds Sunburst attack include mapping of sIDHistory, Primary Group ID, as well as AdminSDHolder to help identify and obtain cached Active Directory credentials. The compromised SAML keys and cryptographic materials were then likely used to execute administrative control and exfiltrate data over an extended duration.Read more
The advent of 5G is an exciting development in connectivity for most businesses. From the farmer who can now remotely monitor field conditions to the global manufacturing leader dependent upon a digital supply chain, to mom-and-pop shops offering real-time-customer service, 5G is changing the way business gets done. And both owners and consumers are enjoying the benefits!
For most, 5G still lacks the true “100 times faster” connection that service providers touted it would bring in 2019. But still, its improvements to speed and lower latency over 4G LTE for business connectivity have already established it as a game changer.
Although 5G is one of the fastest growing technologies in history with adoption 4x as fast as LTE, it will be years before 5G networks blanket the globe. However, explosive adoption is already well underway in the automotive, manufacturing, utilities, and healthcare industries, all of which have been catalysts for a rush on new IoT devices for business efficiencies, enhanced customer service, the movement of large amounts of data, and more.
As 5G network availability grows, the potential for 5G IoT business devices has grown exponentially. Unfortunately, the security risks have grown with itRead more
The Department of Defense (DOD) put out a deadline mandating that specific controls for Covered Defense Information (CDI) and Controlled Unclassified Information (CUI) residing in nonfederal information systems be in place. Many DOD contractors and subcontractors have missed the deadline and are scrambling to update their cybersecurity standards.Read more
FREDERICK, MARYLAND – Fornetix, LLC. today announced it has joined forces with Micron to offer a solution that provides secure and simple trusted Internet of Things (IoT) service delivery. The new solution combines Fornetix’s advanced encryption key management platform, VaultCore with Micron’s Authenta™ Key Management Service (KMS) to accelerate the massive deployment of IoT services, a global market predicted by ABI Research to reach $410 billion in revenue annually by 2026. VaultCore is expected to extend Authenta KMS’ reach through its highly scalable, high-performance and secure platform that supports the operational technology lifecycle from manufacture through deployment, and ultimately until device end-of-life.Read more
What is Cloud Key Management?
Cloud key management is the centralized, singular security solution that manages multiple cloud platforms and applications such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud. The use of cloud key management protects confidential and sensitive information across multiple cloud applications all in one safe and secure environment.Read more
'tis the season to lose data
Overall consumer spending online remains dramatically elevated thanks to the pandemic, and no one is predicting a decline in post-holiday online sales. The sweet spot between Christmas and New Years that brings a frenzy of shoppers searching for year-end bargains isn’t just for those looking to use their gift cards. It’s also a special time of year for cybercriminals who ramp up efforts to phish, scam and hack their way into companies to gain access to valuable data.Read more
FREDERICK, MARYLAND — Fornetix, LLC. today announced their technology partnership with ThinkOn Inc., Canada’s largest wholesale provider of cloud storage, compute, and networking resources. The VaultCore™ Key Management Solution will be deployed as an integral part of the ThinkOn suite of Infrastructure as a Service Offerings (IaaS), and will provide a critical layer of encryption management to ensure that sensitive data will remain secure wherever it resides.Read more
Let us consider a scenario in which an organization, a general contractor utilizing at least one subcontractor, implements a production chain security strategy powered by encryption, but NEGLECTS the addition of a key management system. You’re the CISO, responsible for the cybersecurity strategy that ensures your organization’s information assets and technologies are adequately protected.Read more