Entries by Charisma Burghouts

Why Encryption Key Management Can’t Be an Afterthought

The latest best practices in enterprise data security include utilizing KMIP AND an encryption key management solution. While most security conscious companies are mindful of the latest advancements in storage encryption, there is a lack of attention to the requirements necessary to managing the thousands of keys generated from multiple data centers, storage devices, and […]

Safeguarding Manufacturing: Data Security Control

  The Vulnerabilities. Manufacturing involves multiple tiers of suppliers providing components that come together to create the end product. Each tier is an exercise in unique processes to the manufacturer and their third-party suppliers’ raw materials, production, inventory, and distribution. This complicated convergence of players, processes, and data creates a wicked infrastructure security problem.

The Good, the Bad, and the Ugly of 5G for Business

The Good. The advent of 5G is an exciting development in connectivity for most businesses. From the farmer who can now remotely monitor field conditions to the global manufacturing leader dependent upon a digital supply chain, to mom-and-pop shops offering real-time-customer service, 5G is changing the way business gets done. And both owners and consumers […]

NIST 800-171 Requirements & The Cost Of Not Meeting Them

The Department of Defense (DOD) put out a deadline mandating that specific controls for Covered Defense Information (CDI) and Controlled Unclassified Information (CUI) residing in nonfederal information systems be in place. Many DOD contractors and subcontractors have missed the deadline and are scrambling to update their cybersecurity standards.

Merry Christmas and… Happy Hacking?

’tis the season to lose data Overall consumer spending online remains dramatically elevated thanks to the pandemic, and no one is predicting a decline in post-holiday online sales. The sweet spot between Christmas and New Years that brings a frenzy of shoppers searching for year-end bargains isn’t just for those looking to use their gift […]

PRESS RELEASE: Fornetix to Partner with ThinkOn to Create Key Management as a Service Solution

FREDERICK, MARYLAND — Fornetix, LLC. today announced their technology partnership with ThinkOn Inc., Canada’s largest wholesale provider of cloud storage, compute, and networking resources. The VaultCore™ Key Management Solution will be deployed as an integral part of the ThinkOn suite of Infrastructure as a Service Offerings (IaaS), and will provide a critical layer of encryption […]

CISO SCENARIO: Your Subcontractor Has Been Breached | Fornetix

Let us consider a scenario in which an organization, a general contractor utilizing at least one subcontractor, implements a production chain security strategy powered by encryption, but NEGLECTS the addition of a key management system. You’re the CISO, responsible for the cybersecurity strategy that ensures your organization’s information assets and technologies are adequately protected. Your […]

Hackers Threaten Healthcare Data and Patient Care as Hospitals Endure Overload | Fornetix

Every industry is vulnerable to data breaches, but the healthcare industry has long stood out above the rest. This vulnerability may prove particularly damaging not only to Protected Health Information (PHI) during the COVID-19 crisis but also patient care. 59% of the U.S. population has already had their healthcare records stolen According to HIPAAJournal.com, prior […]