In my opening remarks, I introduced the four pillars of data trust—security, privacy, accountability, and integrity—along with the perceptions and expectations of diverse stakeholders across an organization. In this post, I will examine the common… Continue Reading →
Continue Reading →
Ionic Encrypted Search (IonES) system is a lightweight and scalable multi-user searchable encryption solution that enables users to search and retrieve protected documents in a provably secure way. Sign up for a private beta today.
Continue Reading →
Adam Ghetti, founder and chief technology officer of Ionic Security, discusses how establishing trust in a digital world can cause paralysis. He defines data trust– as the intersection of security, privacy, accountability, and integrity– and outlines how diverse business stakeholders perceive trust.
Faced with rapid digital transformation, security and risk management professionals are tasked with implementing new paradigms to both mitigate risk and reap the rewards of our increasingly connected world. Digital trust is complex, exponential, and… Continue Reading →
Trust is a thorny topic. You and I might agree that trust is essential—from human relationships, to business transactions, to simply driving down the street—and yet we might disagree about, or be unable to clearly… Continue Reading →
Recently, the San Francisco Chronicle published an open invitation from House of Representatives Energy and Commerce Committee Chairman Greg Walden (R-OR) to Silicon Valley CEOs requesting them to testify before the panel and discuss “disruptive… Continue Reading →
Many enterprises now think ‘cloud-first’ when it comes to their IT strategy and software footprint. Cloud adoption has increased steadily over the last decade to the point where recent surveys now show a majority of… Continue Reading →
Trusting No OneIn 2009, Forrester introduced the concept of Zero Trust, warning that the traditional perimeter-based security approaches were becoming ineffective and even dangerous in a world where data rapidly proliferates beyond those barriers.1 Years… Continue Reading →
The end of the year is approaching and planning for the final risk assessment and 2018 audit plan will start soon. With penalties of up to 4% of world-wide revenue, General Data Protection Regulation (GDPR)… Continue Reading →
Many enterprises and people today use cloud storage services for a variety of reasons; from making it easier to access and share data, to reducing enterprise cost and management of on-premise storage, to supporting specific… Continue Reading →