Data Breaches Are A “When,” Not An “If.” Here’s How You Can Prepare.

Cyber attackers have spent considerable time and resource to develop cyberattack methods that evade detection. Which means a focus on complete attack prevention may be unattainable—or if attainable, not sustainable for very long. Cyber criminals are becoming increasingly organized, with increasingly sophisticated attack methods. For most organizations, this means it’s …

Advance Your Hybrid Cloud Journey with PKWARE on the New IBM z16

On April 5, 2022, IBM unveiled IBM z16, a next-generation system with an integrated on-chip AI accelerator delivering latency-optimizing inferencing. IBM z16 is designed to: Predict and automate with accelerated AI Secure with a cyber resilient system Modernize with hybrid cloud. When this announcement dropped, the world witnessed the arrival …

Monthly Breach Report: August 2022 Edition

While cybersecurity attacks are certainly on the rise, interestingly enough, the Ransomware Task Force has found that ransomware attacks that specifically targeted public organizations like local governments, schools, and hospitals have begun to decrease in 2022. But that doesn’t mean it’s time for security teams to relax. Vigilance and preparation …

Think Full Disk Encryption is Good Enough? Think Again.

Most often, the word “encryption” brings to mind decryption keys and complex processes that cause friction to the end users in order to access data. Because of the friction these processes create, it’s common for businesses to use alternate forms of encryption such as disk encryption to meet business or …

PCI DSS Version 4.0: Managing Your Scope for “Significant Change”

After a few delays, PCI DSS version 4.0 was finally announced publicly on March 31, 2022. While entities may still use PCI DSS v3.2.1 until its retirement date on March 31, 2024, there are some notable changes that should be given consideration in advance. Since the initial evolution of PCI …