Protecting SAP HANA from Decrypting Eyes

Cyber-attacks are a painful reality in today’s ultra-connected world of gadgets, global positioning and gigabytes of everything. It’s very likely that if you’re reading this, you’ve been a victim of some form of cybercrime in the last 12 months. Whether from an attack on your health insurance provider, a mass credit card hack, or intrusion of your favorite big box retailer — malicious invasions come in many different forms and we’re all susceptible. This is especially true for high-profile organizations and mainstream corporations. Who can forget the near constant coverage of the Sony Pictures hack in 2014 that resulted in thousands of confidential articles and emails exposed to the world?

Read more

C-Suite and Techies: Best Security Results for the Least Cost

Sometimes executives cut off communications with their IT/security staff because they seem to want to spend more money on IT solutions. While IT costs can be high, it is not always the case that building better security requires a layout of significant cash. In fact, it is possible to deploy reasonably resilient security without an overly burdensome security budget. We simply need to look for methods, techniques and tools that are less expensive and that take advantage of existing knowledge and technology.

Read more