Skip To Main Comtent


It’s been nearly ten years since Forrester Research first published a paper recommending the "zero trust" model of information security. The time had come, the paper argued, to abandon the idea of an unbreakable network perimeter, and to deal with the reality that intruders will inevitably find their way into protected networks.

In the years since, the zero trust model has changed the way many organizations design and operate their networks. However, in order to live up to its full potential, zero trust architecture must be paired with a corresponding strategy for protecting the thing hackers are really after: sensitive data itself.

Read more ...

Moving to the cloud is supposed to make everything better. Costs go down, efficiency goes up, and collaboration gets easier.

Security is supposed to be easier, too. Cloud providers and managed service providers offer streamlined architecture, up-to-date systems, and economies of scale that let them devote more resources to security than their customers could afford on their own. However, as the massive Cloud Hopper breach has shown, cloud-based security is not a complete answer.

Read more ...

Data security has become synonymous with cloud security. Now that more than 90% of companies have adopted cloud services, and (according to some projections) more than half of all IT workloads are being handled in the cloud, protecting data requires a "cloud first" mentality. The need to exploit cloud capabilities while keeping data safe has security professionals, industry analysts, and even cloud providers trying to answer the same question:

How should data be encrypted in the cloud, and who should hold the keys?

Read more ...

Automotive suppliers must meet TISAX data security standards in order to do business with any major German automobile company. PKWARE helps companies simplify TISAX compliance by providing a wide range of capabilities to address multiple requirements. In our TISAX blog series, we're examining the requirements auto industry suppliers and service providers must meet, and how PKWARE is helping organizations meet those requirements.

Today's topic: event logging.

Read more ...

Automotive suppliers must meet TISAX data security standards in order to do business with any major German automobile company. PKWARE helps companies simplify TISAX compliance by providing a wide range of capabilities to address multiple requirements. In our TISAX blog series, we're examining the requirements auto industry suppliers and service providers must meet, and how PKWARE is helping organizations meet those requirements.

Today's topic: encryption, and how to implement it.

Read more ...

Updated November 2019

In one of the most significant cybersecurity developments of recent years, the California Consumer Privacy Act (CCPA) is bringing the key concepts of Europe’s GDPR onto American shores.

Read more ...

Automotive suppliers must meet TISAX data security standards in order to do business with any major German automobile company. PKWARE helps companies simplify TISAX compliance by providing a wide range of capabilities to address multiple requirements. In our TISAX blog series, we're examining the requirements auto industry suppliers and service providers must meet, and how PKWARE is helping organizations meet those requirements.

Today's topic: controlling access to sensitive information.

Read more ...

With so many new regulations and policies to manage, how are organizations creating a unified data protection and compliance strategy that meets conflicting requirements? This was the topic of discussion in an executive boardroom session moderated by PKWARE CEO Miller Newton at last week’s Evanta CISO Executive Summit in Milwaukee.

Read more ...