Tag: certes networks

Common Education Sector security misconceptions

Common Education Sector security misconceptions

2016 hasn’t begun in a very positive way for education institutions. January 2016 saw data on 80,000 students, faculty, and staff at UC Berkeley compromised in the University’s third data breach disclosure of the past 15 months.

The problems with backdoors into security solutions

The problems with backdoors into security solutions

Backdoors into security solutions, specifically encrypted communications, have been a major topic in some huge debates lately. While this discussion has certainly taken place in the past, it recently has shaken the tech industry to its core after Apple CEO Tim Cook released a letter stating that the company will fight the FBI’s court order to provide a backdoor into an encrypted iPhone.

The Do’s and Don’ts of cybersecurity for retailers

With $4.45 billion spent during a major online shopping weekend in November 2015 alone (Fortune), it’s clear that the need for retailers to safeguard credit card data, consumer data, transactions and other sensitive data is becoming ever more pressing.

Three critical steps to protecting patient data

CryptoFlow® secures Romanian Ministry of Foreign Affairs

The Romanian Ministry of Foreign Affairs (MoFA), the institution of central public administration which implements Romania’s foreign policy, has deployed Certes Networks’ CryptoFlow™ solutions to protect its essential networked applications and ensure the security of end-to-end data in transit.

Three IT Security Predictions for 2016

An abundance of security breaches came to light throughout 2015; so many that hearing yet another hacking story on the news wasn’t surprising. Now that 2016 has arrived, Paul German, VP EMEA, Certes Networks gives three predictions for what will happen in IT security this year.

"Cyber security isn't working - security breaches are inevitable

“Cyber security isn’t working – security breaches are inevitable.”

Paul German insists it is time to face up to the futility of breach detection and protection alone, and that organisations must make a change to avoid the fate of the organisations that have recently hit the hacking headlines. Too many companies are being breached; and governments globally are recognising the need to invest heavily to protect vital services and infrastructure.

Scroll to Top