Decentralized Identifiers: Putting You in Charge of Your Identity

Most of the discussion about identity in the media and on the internet recently has been quite negative, focusing on violations of your privacy and the misuse of personal information tied to your identity. On more than one occasion, we have seen an identity management database compromised, which allows the identity details for millions of users to be obtained by darknet participants or state-sponsored cyberhackers.

3 Best Practices to Enforce Media Data Security with Encryption Key Management Services

Based on Equinix’s experience in providing encryption and connectivity services for globally distributed enterprises, we share three best practices—cloud-neutral encryption key management services, private connections and partner ecosystems—for securely managing content and media data/assets.

The Balance Between Data Security and Digital Transformation

What was physical is rapidly becoming digital, as every industry undergoes a digital transformation. Digital wallets, with details about your identity and your credit card information encrypted somewhere in the cloud, are replacing credit and debit cards, which have largely replaced printed currency and checks. Newspapers, magazines, music and movies are consumed digitally. Robotics eliminate manual assembly processes and deliver consistent quality at lower cost. The notion of driving a car may soon become as outdated as dialing a phone.

How to Converse in Cloud: Cloud Security Controls

When compute processing, content and data move to the cloud and data sources become more geographically dispersed, protecting those assets can be a challenge. Security controls need to extend out to the edge to deliver robust and reliable data and application privacy, protection and compliance.

Key Management in Multicloud Environments

The cloud, mobile devices, the Internet of Things (IoT) and the proliferation of software applications that touch nearly every aspect of quotidian activity create ever-greater volumes of data. These, unfortunately, are targets of nefarious individuals, organizations and government entities seeking financial gain or major economic or operational disruption.

Is your Cybersecurity Strategy Sufficient to Protect Your Cloud Data?

Organizations are increasingly vulnerable to data breaches. SmartKey provides secure encryption key management to protect cloud data.

Data Privacy Day: 3 Trends to Watch

Today is Data Privacy Day, an international awareness day held annually on January 28 to promote the importance of respecting privacy, safeguarding data and enabling trust. It was initially celebrated in Europe in 2007 to commemorate the Jan 28, 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Today, it is celebrated worldwide, with many events, resources and even a live stream sponsored by the National Cyber Security Alliance.

Encryption Key Management Best Practices

Data encryption is the bedrock of cybersecurity. Encrypted data remains worthless ciphertext without access to encryption keys; hardware security modules (HSM) are well-established means for securing those keys in on-premises data centers. Data security teams are well-versed in the process of purchasing, provisioning and managing those HSMs.

Data Breaches and Penalties

Every organization strives to keep data secure. However, in light of the frequency of successful cyberattacks and the often less-than-forthright acknowledgment of such attacks by major organizations, governments have stepped in to implement data processing and privacy regulations which impose severe penalties for violations

CES 2019: Innovation Gives Rise to Intelligent Home

The Consumer Electronics Show (CES) in Las Vegas has come a long way since it was first launched in New York in 1967. With 200 exhibitors attracting 17,500 attendees, the big news of the day back then was pocket radios and televisions with integrated circuits.i Fast forward to 2019, and a lot has changed.