Is your Cybersecurity Strategy Sufficient to Protect Your Cloud Data?

Organizations are increasingly vulnerable to data breaches. SmartKey provides secure encryption key management to protect cloud data.

Data Privacy Day: 3 Trends to Watch

Today is Data Privacy Day, an international awareness day held annually on January 28 to promote the importance of respecting privacy, safeguarding data and enabling trust. It was initially celebrated in Europe in 2007 to commemorate the Jan 28, 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Today, it is celebrated worldwide, with many events, resources and even a live stream sponsored by the National Cyber Security Alliance.

Encryption Key Management Best Practices

Data encryption is the bedrock of cybersecurity. Encrypted data remains worthless ciphertext without access to encryption keys; hardware security modules (HSM) are well-established means for securing those keys in on-premises data centers. Data security teams are well-versed in the process of purchasing, provisioning and managing those HSMs.

Data Breaches and Penalties

Every organization strives to keep data secure. However, in light of the frequency of successful cyberattacks and the often less-than-forthright acknowledgment of such attacks by major organizations, governments have stepped in to implement data processing and privacy regulations which impose severe penalties for violations

CES 2019: Innovation Gives Rise to Intelligent Home

The Consumer Electronics Show (CES) in Las Vegas has come a long way since it was first launched in New York in 1967. With 200 exhibitors attracting 17,500 attendees, the big news of the day back then was pocket radios and televisions with integrated circuits.i Fast forward to 2019, and a lot has changed.

Fortifying Your Cybersecurity Strategy

Fortifying our cybersecurity strategy is a critical priority at Equinix, as it is for our many customers around the world. In this blog from our continued series on the topics that keep CIOs on their toes, we’ll tell you about some of the best practices we employ to keep ahead of the quickly evolving cyberattack threat.

What Value does a Managed Security Operations Center Bring to Your Ecosystem?

In the Motiv SOC, all activities on the application and associated data are collected, analyzed and correlated in a centralized manner for its customers, so deviations can be recognized quickly and reported. Initially, the SOC service was mainly reactive, but Motiv is now focusing on real-time alerting to provide faster insights for customers to immediately analyze and solve potential security breaches.

Securing the Unsecurable in Interconnected Digital Technology: Part I – Interconnection Oriented Architecture

Advances in the use of digital technology have improved customer experiences in most industries. Look around—there isn’t a day that we’re not benefitting, as individuals and as a society, from recent advances in digital technology, whether by using an innovative application or by discovering a disruptive digital service capable of transforming some aspect of our daily routine.

Keeping Data Secure in the Digital Revolution

Today, developers take advantage of thousands of productivity-enhancing tools and resources and collaborate in real-time with colleagues worldwide to deliver and support software applications and solutions that improve individual lives as well as corporate performance.

Equinix and F5 Networks Deliver Automated HSM as a Service

Together, Equinix and F5 Networks have delivered flexible, programmable technologies that create new hybrid IT environments without compromising on security or control. At the F5 Agility 2018 event in Boston, Equinix and F5 are promoting a new collaboration to deliver encryption key management as a service for hybrid/multicloud environments via the F5 BIG-IP as a Cloud Gateway and Equinix SmartKey™ key management solution by the end of this year.