Zettaset Blog

  • December 13, 2017
    by Ramona Carr, Cybersecurity Blogger

    Types of Encryption: What You Need to Know About Underlying Algorithms

    You know that encryption is an incredibly powerful strategy for protecting your data—but how does it actually work? There are many different encryption types and examples out there. It can be difficult to find just the right information you need.
    There are two types …

  • December 1, 2017
    by Ramona Carr, Cybersecurity Blogger

    Four Encryption Features To Prioritize When Choosing Encryption Software

    Choosing your encryption solution is a major decision. This is the software that protects the valuable digital assets in your enterprise organization even when a perimeter breach occurs, making your sensitive company and customer information absolutely undecipherable. But how do you know you’re choosing …

  • November 21, 2017
    by Ramona Carr, Cybersecurity Blogger

    IoT Security Challenges With Data and the Cloud

    With a projected $267 billion in market revenue by 2020, the Internet of Things (IoT) is a red-hot topic these days. IoT adoption continues to climb, however it also poses new security concerns. With more data to collect and analyze, the possibility that something …

  • November 15, 2017
    by Ramona Carr, Cybersecurity Blogger

    What CSOs Need to Know About Retail Cybersecurity

    The threat of data breaches is a growing concern for CSOs in the retail cybersecurity space. According to IBM’s 2016 Cost of Data Breach study, data breaches in retail are more damaging financially than any other industry. The average cost is $172 per record …

  • November 8, 2017
    by Ramona Carr, Cybersecurity Blogger

    The 5 Biggest Cybersecurity Threats Facing Financial Services

    There are a multitude of cybersecurity technologies in use in the financial services sector. These include firewalls, SIEM, UEBA, and data encryption to name just a few. Financial services organizations face unique and heightened risks in terms of cybersecurity. This is because of the …

  • October 25, 2017
    by Ramona Carr, Cybersecurity Blogger

    HIPAA Data at Rest Encryption Requirements

    From patient records to MRIs and other medical images, the sheer amount of data generated by healthcare organizations is expanding year after year. However, this information isn’t just a valuable source of medical insights. It’s also a tempting target for data thieves and other …

  • October 18, 2017
    by Ramona Carr, Cybersecurity Blogger

    What is Data Theft? And How Do I Prevent It?

    As technology and society become increasingly intertwined, your private data will eventually be in the hands of a greater number of organizations. This has significant advantages in terms of convenience and productivity. But it also means that the likelihood of sensitive information being stolen …

  • October 11, 2017
    by Ramona Carr, Cybersecurity Blogger

    Data Breach Accountability and Responsibility: Who Gets Blamed for Data Breaches?

    It seems like every other week there are headlines about another major company suffering a massive data breach, exposing the personal information of millions of users. One of the more recent examples—and arguably the most devastating—is the massive Equifax data breach.
    Analysts estimate this …

  • September 20, 2017
    by Ramona Carr, Cybersecurity Blogger

    Security Vulnerability Advice: Securing Big Data

    Big data has revolutionized the way companies do business. It has also impacted day-to-day enterprise security concerns. As big data and big data warehouses become more universally adopted, the threat of this information getting into the wrong hands is increasing. With large big data …

  • September 6, 2017
    by Ramona Carr, Cybersecurity Blogger

    Why Healthcare Data Protection Needs to Include Encryption

    Since the government has implemented more regulations enforcing the privacy and protection of healthcare records, the healthcare industry has been forced to more fully address healthcare data protection and security. Although regulations do not specifically require data encryption, many healthcare organizations are using it …

Our Resources
Solution Briefs
White Papers
Application Briefs