AlienVault announces availability of updated open ... » LONDON, UK: AlienVault announced the general availability of an updated version of Open Threat Excha... BeyondTrust introduces first commercial least pr... » PHOENIX: BeyondTrust has announced the release of PowerBroker for Mac to address security and compli... Free mobile app helps integrators work more effici... » OTTAWA, ONTARIO: March Networks has launched a new version of its industry-first GURU Smartphone App... Cult of celebrity reaches the gun world » A recent analysis of the sporting gun market by Bonhams, one of the major players in this field, sho... Bonhams antique arms and armour sales hit £1 mil... » The steely strength of the Antique Arms & Armour market at Bonhams was in evidence again this week w... Amosun, keep off campus politics...collecting N15,... » We would begin this editorial by sounding a very strong warning to all political officials in Nigeri... Trafficking: Human, Drug, Contraband and CBRNe at ... » Trafficking remains one of the major issues for border security and management agencies. Whether hum... Imperva Cited as a Leader by Independent Research ... » Imperva Incapsula DDoS Protection received highest score in Current Offering category REDWOOD SH... ROYAL NAVY'S LATEST SUBMARINE TO SET SAIL THIS SUM... » HMS Artful, the third of the Royal Navy’s new Astute Class attack submarines will set sail for sea t... Datum reaffirms its commitment to information secu... » FARNBOROUGH: Datum Datacentres has announced that it has achieved ISO 27001 transition to 2013 stand...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

“The takeout for me is that this saga highlights the critical need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used across your company” -- Dave Anderson, Voltage Security

 

Commenting on the Internal Revenue Service’s accidental exposure of thousands of Social Security numbers on the Internet – which were spotted by a California-based archivist – Voltage Security says this highlights the need for encryption and tokenisation of any sensitive data to protect any organisation against the negative impact of data exposure.

The problem with modern IT systems, says Dave Anderson, a senior director with the data-centric security specialist, is that data can be replicated, shared and moved across multiple systems – quite literally - at the touch of a button. This requires data to be protected across its entire lifecycle, not only when it is stored away.

And with cross-platform systems and topologies making it difficult to know whether an IT resource is local, remote or cloud/outsourced, controlling data held in the clear has become an almost impossible task, he adds.

“This breach further highlights the issues around effective data security, and re-iterates the need to implement robust encryption, tokenisation and data masking controls on the data itself in order to provide comprehensive protection. This is the only way to protect sensitive information as it moves throughout an extended enterprise,” he said.

“The takeout for me, however, is that this saga highlights the need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used and moved. The problem with multi-dimensional data – especially spreadsheet or SQL database files – is that it is very difficult to understand which elements contain private data. For this reason, encryption and tokenisation of all data becomes a driving imperative,” he added.