New Reebok ZigKick Tactical line re-engineers el... » St. Louis, MO: Warson Brands, official licensee of Reebok tactical footwear, introduces the new Reeb... Security Council extends UN mission in South Sudan... » A wide view of the Security Council in session. UN Photo/Devra Berkowitz (file) Vigilance can ... Fire training in the build up to be... » Lee Coates, Wrightstyle's technical director, looks at fire training in the build up to Christmas... Running For Their Lives? Reflections On The Curren... » The present mass movement of humans has been more widely described as that by “migrants” than that b... BSIA welcomes revision of British Standard BS7958 » James Kelly, CEO, BSIA The British Security Industry Association (BSIA) has welcomed the rev... ASIS International announces three Board certifica... » Alexandria, Va. (Oct. 9, 2015) – ASIS International (ASIS), today announced that the American Counci... NATO Secretary General strongly condemns terrorist... » Jens Stoltenberg I strongly condemn the terrorist attack in the centre of Ankara that killed and ... Securonix joins the Intelligence and National Secu... » LOS ANGELES: Securonix has announced that it is proud to join The Intelligence and National Security... Digital Guardian acquires Code Green Networks » London, United Kingdom: Digital Guardian has acquired Code Green Networks, a provider of Data Loss P... QuintessenceLabs selected as a SINET top 16 emergi... » SAN JOSE, Calif: Vigilance can report that QuintessenceLabs is a winner in the annual SINET 16 Innov...


Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.


Subscribe to Vigilance Weekly

Information Security Header

“The takeout for me is that this saga highlights the critical need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used across your company” -- Dave Anderson, Voltage Security


Commenting on the Internal Revenue Service’s accidental exposure of thousands of Social Security numbers on the Internet – which were spotted by a California-based archivist – Voltage Security says this highlights the need for encryption and tokenisation of any sensitive data to protect any organisation against the negative impact of data exposure.

The problem with modern IT systems, says Dave Anderson, a senior director with the data-centric security specialist, is that data can be replicated, shared and moved across multiple systems – quite literally - at the touch of a button. This requires data to be protected across its entire lifecycle, not only when it is stored away.

And with cross-platform systems and topologies making it difficult to know whether an IT resource is local, remote or cloud/outsourced, controlling data held in the clear has become an almost impossible task, he adds.

“This breach further highlights the issues around effective data security, and re-iterates the need to implement robust encryption, tokenisation and data masking controls on the data itself in order to provide comprehensive protection. This is the only way to protect sensitive information as it moves throughout an extended enterprise,” he said.

“The takeout for me, however, is that this saga highlights the need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used and moved. The problem with multi-dimensional data – especially spreadsheet or SQL database files – is that it is very difficult to understand which elements contain private data. For this reason, encryption and tokenisation of all data becomes a driving imperative,” he added.