Zettaset Blog

  • July 19, 2018
    by John Armstrong, Chief Marketing Officer | LinkedIn

    Taking the Fear out of Encryption

    We’ve entered an age when the conveniences of widespread connectivity, the cloud, and cheap (almost unlimited) storage have put us at more risk than ever of getting hacked. At the same time, malicious actors have become more sophisticated, resourceful, and persistent. When data does …

  • April 25, 2018
    by Ramona Carr, Cybersecurity Blogger

    The Final Countdown: A GDPR Summary with 1 Month to Go

    The GDPR (General Data Protection Regulation) was formally adopted in April 2016, and goes into effect on May 25, 2018. Some tech leaders are calling it “the next Y2K” for the dramatic impact that it will have on IT systems around the world. Unlike …

  • March 29, 2018
    by Ramona Carr, Cybersecurity Blogger

    Top Challenges in Cloud Security for 2018

    Cloud computing is a fast-growing, lucrative industry. The seven largest enterprise cloud vendors—Microsoft, Amazon, IBM, Salesforce, Oracle, SAP, and Google—posted a combined 2017 cloud revenue of $76.3 billion.
    These earnings, combined with the sheer volume of data stored in the cloud naturally make cloud …

  • March 13, 2018
    by Ramona Carr, Cybersecurity Blogger

    GDPR Compliance and Encryption Requirements to Know About

    The General Data Protection Regulation (GDPR) is now just three months away from taking effect. Many businesses, however, have been slow to act. A large number remain ignorant about how this new legislation will directly affect their companies. Here’s a look at the GDPR …

  • February 19, 2018
    by Ramona Carr, Cybersecurity Blogger

    Cryptocurrency Security: Bitcoin and Ripple Mean New Security Concerns

    One of the best investments you could have made in 2017 wasn’t a stock or a precious metal like gold. In fact, it doesn’t physically exist at all. Bitcoin, the most popular cryptocurrency, rose from under $1,000 to over $14,500 between January and December of …

  • February 13, 2018
    by Ramona Carr, Cybersecurity Blogger

    Data Integrity Attacks: Is Data Manipulation More Dangerous Than Theft?

    When you hear the phrase “data breach,” you probably imagine a scenario where hackers break into a system and steal sensitive information. Yet data integrity attacks can be just as dangerous as data theft — and, in many cases, more dangerous.The idea behind data …

  • February 5, 2018
    by Ramona Carr, Cybersecurity Blogger

    Challenges with Data Security Regulatory Compliance in Financial Services

    Zettaset was recently featured on IT Portal Pro, an IT news platform that is one of the UK’s most respected resources for technology information. A summary of the featured article can be found below.
    The financial services industry is faced with the challenge of …

  • January 31, 2018
    by Ramona Carr, Cybersecurity Blogger

    The Equifax Data Breach Update: Where Are We Now?

    Dan Goodin, security editor for tech news website Ars Technica, has called the Equifax data breach “possibly the worst leak of personal information ever.” The breach exposed private information of an estimated 143 million Americans. Yet despite making international headlines in September, the Equifax …

  • January 23, 2018
    by Ramona Carr, Cybersecurity Blogger

    What is GDPR?

    If you’ve been keeping up with information protection and privacy news, you’ve likely wondered what exactly this “GDPR thing” is all about. GDPR is short for the General Data Protection Regulation, and it’s scheduled to come into force on May 25, 2018.
    The GDPR …

  • January 19, 2018
    by Ramona Carr, Cybersecurity Blogger

    What the Retail Industry Needs to Know About PCI Compliance

    As a retailer, protecting your customers’ sensitive information is your most important obligation. With news of devastating data breaches constantly in the headlines, you need to take steps to ensure that credit and debit card information is always stored, processed and transmitted securely.
    The …

Our Resources
Solution Briefs
White Papers
Application Briefs