Posts Tagged ‘encryption’
The PKI Guy talks identity management with Jay Schiavo of Entrust Datacard
Q&A with Jay Schiavo, vice president of Entrust Certificate Services Markets, Entrust Datacard TPG: How will nCipher Security strengthen Entrust Datacard’s offering to secure data and verify identities, and reduce risks? JS: The acquisition of the nCipher general purpose HSM business allows Entrust Datacard to provide our customers with solutions that exceed expectations for high-assurance use cases…
Read MoreThe PKI Guy explores data encryption with Cindy Provin of nCipher Security
Q&A with Cindy Provin, CEO, nCipher Security TPG: There has been lots of news lately about your company being acquired by Entrust Datacard. What’s the latest with nCipher Security? CP: nCipher Security is a separate company within Thales. nCipher has been operating as a separate stand-alone business within Thales since January 2019. We continue to…
Read More7 Top Cybersecurity Trends in 2019
Forty-three percent of businesses were a victim of a cybersecurity breach in the past year, based on the recent Cyber Security Breaches Survey 2018. Organizations are continuing to do a less than stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs, poor authentication, etc. In fact, 4.5 billion data records were…
Read MoreWhat Types of Threats and Encryption Will We See in 2019?
What were the biggest cybersecurity concerns of 2018? What will the biggest technology trends be in 2019? Mark is interviewed about threats and encryption, taking a look at cybersecurity in 2018 and a look ahead to 2019. Check out the Q&A in Solutions Review.
Read MoreThe PKI Guy talks digital identity with Kevin von Keyserling of Keyfactor
Q&A with Kevin von Keyserling, CEO and co-founder, Keyfactor TPG: Tell us about Keyfactor. KvK: We’re a digital identity software company that provides end-to-end authentication, encryption, and signing technologies that safeguard data, devices, applications, and people. Our platform allows our clients to master every digital identity within their organization quickly, easily and cost-effectively. Up until a…
Read More