Updates on the Munich Security Conference 2017 » Source: Munich Security Conference Chancellor Merkel to give speech – President Gauck to receive E... Innovative third party add-on appliance helps MO... » UK: MOBOTIX AG - as part of a strategy to encourage partners to build a higher value solution, MOBOT... SentinelOne named a visionary for second straigh... » PALO ALTO, Calif: SentinelOne has announced it has been positioned by Gartner, Inc. in the Visionary... Send For Help one of the First Organisations ... » Send For Help is one of the first companies to be successfully audited against the latest version of... NATO Secretary General Jens Stoltenberg in a chat ... » Press Conference NATO Secretary General Jens Stoltenberg Good afternoon. We just conducted a goo... Trustis to provide Vormetric Data Encryption Servi... » LONDON, England: Thales has announced that its specialist cryptographic services provider Trustis ha... RiskIQ digital threat detection data indicates a... » London, UK: RiskIQ has released its annual malvertising report which indicates a sharp spike in malv... Ciena implements licensing solution from Flexera S... » Maidenhead, U.K: Flexera Software has announced that Ciena has implemented FlexNet Licensing and Fle... Checkmarx announces Open Beta for Scala Programm... » New York: Checkmarx has announced open beta support of the Scala programming language. The new capab... SERVICE PERSONEL WANT GREATER CHOICE ON WHERE THEY... » Service personnel want greater choice in deciding where they live, according to a survey on what the...


Viewpoints Header

It seems that this disk drive may have belonged to an analyst processing loan applications. It is likely that there was no need for the analyst to have access to full live data to meet the business need. So why was live data lost so easily – especially given the Canadian PIPEDA regulations that have been in place for more than 10 years?

Encryption is a non-negotiable requirement for sensitive data such as personal information. PIPEDA requires “appropriate security measures” to be in place when handling it. There clearly wasn’t any here. Sadly, in data breaches like this the knee-jerk reaction is to encrypt all disk drives. That only solves a fraction of the risk challenge of handling sensitive data like loan application records. The real risk is the data, not the disk or server. Data goes everywhere – so protection has to be with the data itself. That said, where else is this information at risk? Why was such a significant trove of sensitive data on a portable disk drive in the first place? Why was someone able to copy unprotected data from an application or database without the appropriate protection? The industry has now agreed that traditional defenses – protecting infrastructure or storage, doesn’t do enough to protect data across the end-to-end data lifecycle. Fortunately, a new best practice called data-centric security has emerged as the leading method to mitigate breach risks. Data-centric security makes it easy to protect data wherever it goes to avoid the costly ramifications of data breaches accidental or malicious, yet enabling the data’s use in a data-rich process: a win-win for the CISO, privacy compliance and the line of business consuming the data.

Through powerful breakthroughs in data protection technology, it’s now possible to maximise data use without increasing risk without exposing the “live” data to low trust environments that are common in today’s information supply chain. Data-centric security techniques such as Format Preserving Encryption (FPE) – NIST FFX mode AES, are establishing the new standards for information protection. FPE enables data to stay protected from capture without the pain and friction of traditional data-encryption methods by allowing the protected data to preserve the look and feel of the original data. If anyone steals the FPE protected data or it’s lost, it’s useless to the attacker, removing the need for costly breach remediation. So in this case, the data in the records of 500,000 load applications could have been protected as it was captured and consumed across the business process without exposure. With a data-centric approach nobody would be footing the bill for $650,000 of unnecessary spend as in this case.