FREDERICK, MD - Fornetix, Inc., an industry pioneer and leader in enterprise encryption management technology, has partnered with OutSecure, a preeminent Cybersecurity & Privacy Strategy creation company, to provide a comprehensive and complete approach to cybersecurity to smart cities.
Read moreFREDERICK, MARYLAND – Fornetix, Inc., an industry pioneer in enterprise encryption management technology, announces the appointment of Richard C. Schaeffer, Jr. to the company’s Board of Directors. Mr. Schaeffer is a former Senior Executive with the National Security Agency (NSA) and brings over 40 years of experience from roles throughout the defense and intelligence communities. His career includes extensive leadership, management, and technical expertise in the areas of information security and assurance, helping to safeguard many of the nation’s most critical and sensitive assets.
Read moreWhen considering the intersection of Roots of Trust and the accessibility of services provided by cloud architecture, reliable options quickly become scarce. That is why we at Fornetix are excited to see nCipher launch their "nShield as a Service" (nSaaS) offering. With the combination of Internet of Things (IoT) based technologies and the embracing of "as a Service" cloud capabilities, there is a growing need for HSM services that can be provisioned and integrated with cloud principles while not belonging to a specific cloud vendor. At Fornetix, we built our technology to play to the middle, enabling public, private, and hybrid cloud solutions. We are excited to see nCipher’s nSaaS solution parallel our own. We believe the joint approach will help customers embrace effective use of cryptography no matter how they use technology, whether it be cloud first/cloud native, hybrid cloud, or private cloud.
Read moreThere are two popular types of malicious attacks: A data breach and a ransomware attack. You may have heard these two terms used interchangeably, however they're not quite the same. A data breach occurs when a hacker gains access to information and steals the unencrypted data from the system. This is often used to steal financial, medical, and other personal information. A ransomware attack occurs when hackers gain access to a system and hold the data hostage in exchange for a ransom, regardless of whether the data is encrypted or unencrypted. A hacker may keep the data inside the enterprise's system but encrypt it so the right people can’t gain access to it. They may also remove the data from the system and return it in exchange for ransom. Both types of attacks have been around for a while, but recently, ransomware attacks have become more prevalent.
Read moreWhen looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.
Read moreOlympic high diving requires concentration and self-control. Before divers jump off a 10-meter platform, they pause at the edge and concentrate on their goal: elegantly perform the acrobatic maneuver and gracefully pierce the water causing minimum surface disturbance. This same disciplined approach is required when adopting new and revolutionary technologies, such as those now available through the Internet of Things (IoT). Decision makers must assess the risks and benefits, consider potential difficulties, and then take the jump.
Read moreImplementing an encryption strategy comes with hefty baggage, but don't worry; we've got you covered. In this post, we'll cover the top four challenges of managing encryption issues and solutions to overcome them.
Encryption key management is increasingly more important the more connected we become. With millions of devices and millions of users, there becomes an increasing need for effective cybersecurity tools that safeguard sensitive assets for individuals and organizations.
Read moreFrederick, MD, Feb. 2019 – Fornetix, an Orchestration Equity company and industry pioneer in enterprise key management technology, is excited to welcome Bill Regan as Senior Vice President of Finance. Regan brings to Fornetix 35 years of finance and accounting experience, including 25 years at public companies. He has extensive transactional experience including two IPOs and numerous acquisitions, divestitures, and financings. He comes to Fornetix from the specialty financing sector where he served as a corporate controller. Prior to that, he served as Vice President, Corporate Controller at Rentech. Regan holds a Bachelor of Science degree in Business Administration — Accounting from California State Polytechnic University, Pomona and is a Certified Public Accountant (inactive).
Read moreSterling, VA and Frederick, MD – February 5th, 2019 – Network Runners, Inc, a top technology consulting services company that supports the commercial and federal government market spaces, and Fornetix, a leading provider of encryption key management solutions for cyber security, announced they will partner and showcase cutting-edge defense systems at the AFCEA WEST Conference in San Diego, CA, on February. 12-15, 2019.
Read moreWould you consider giving up personal data in exchange for a third-party app to show you what your ninety-year-old self will look like? The rise of social media brought lots of joy to consumers’ lives, allowing users to get glimpses of their future selves, to find out their horoscopes, and to communicate with others across the globe.
Read more