• February 24, 2015

    SSD Management Made Easy

    As Greg Kazmierczak, the Chief Technical Officer of Wave Systems tells us, “Wave provides IT managers with a complete data protection solution for their organization’s SEDs, all from a single remote console—either on-premise or in the cloud.  Wave EMBASSY® Remote Administration Server (ERAS) and Wave Cloud solutions were specifically tailored to manage superior encryption options such as SEDs fro

    Read More...

  • February 4, 2015

    Three Adware-Infected Android Apps Suspended From Google Play

    Wave Systems CTO Greg Kazmierczak comments on recent reports that three popular apps in the Google Play Android app store were infecting users with adware. Though Google is said to be scanning for potential risks, there are multiple challenges in properly identifying all potential situations. “Google has been doing a better job of scanning for malicious apps, but in all reality, it can be difficult to prove that malicious code is even in an app at all,” said Kazmierczak.

    Read More...

  • January 30, 2015

    Don't Be Next: How to Stop the Next Hack Attack

    Fresh Business Thinking, an online UK-based publication geared towards business owners, directors and entrepreneurs, recently picked up an article crafted by Wave's Boudewijn Kiljan who offers his take on how best to secure a company's assets in a modern workforce environment that is essentially borderless.  

    Read More...

  • January 19, 2015

    Bold Reform Needed to Strengthen Our Cybersecurity

    In the hours leading up to President Obama’s State of the Union address, Bill Solms takes a firm stance on the state of cybersecurity in our nation. Leading off the article in a pseudo letter to the President, Bill clearly states his position, saying “Mr. President, the status quo in cybersecurity is failing this country.

    Read More...

  • December 18, 2014

    Securing edge devices and data in distributed industrial applications

    In the last few months there has been a resurgence of interest in the internet of things, suggesting that the era for building distributed big data industrial applications has at last dawned. Power companies are working hard to build the smart grid by melding IT technology with electricity services. Oil companies are integrating their machinery into digital oil fields. Photovoltaic technology is being developed as a consumer product, to integrate with the smart grid centralised solar farms, and distributed residential solar stations.

    Read More...

  • December 8, 2014

    Cybersecurity Blind Spots: What Aspiring Experts Need to Know

    As cautious as some people are about their web browsing habits, they throw that caution to the wind when it comes to managing their passwords. This was apparent in a survey of some 1,000 Internet users performed for ComputerTrainingSchools.com by Op4G.

    Read More...

  • November 17, 2014

    U.S. State Department is Latest Hacking Victim

    Over the course of the last several weeks, a number of high-profile U.S. federal networks have been breached by attackers. The latest organization to be breached is the U.S. State Department, which had to take its email system offline. The breach at the State Department follows attacks against the White House, the United States Postal Service (USPS) and the National Oceanic and Atmospheric Administration (NOAA).

    Read More...

  • November 14, 2014

    Self-Encrypting Drives

    Wave's EMBASSY® Remote Administration Server was recently mentioned by name in a CSO Online article about self-encrypting drives. “SEDs are becoming more popular as businesses realize the importance of security data at rest,” states the article. It appears as though, once again, Wave was ahead of its time. According to the author, the key selling point for SEDs isn't just that they encrypt data, but that it's carried out in the firmware of the drive.

    Read More...

  • November 14, 2014

    A Modern Approach to Authentication – The Virtual Smart Card

    Highlighting the ongoing challenges of CEOs and CIOs to minimize the onslaught of cyber attacks against enterprises, Girish speaks to the need to not only “support” strong authentication, but to also understand the strength and the context of the solutions, as well as the industry standards that apply. Girish offers the Wave Virtual Smart Card as a solution – pointing to its ease of use and its ability to lower total cost of ownership by upwards of 50 percent.

     

    Read More...

  • November 11, 2014

    US Postal Service Breach Hits Staff and Customer Details

    The US Postal Service (USPS) revealed its systems have been hacked and personally identifiable data related to employees and customers exposed. A spokesperson for the USPS explained that the information associated with employees “may include” names, dates of birth, Social Security numbers, addresses, employment dates, emergency contact details and more.

    Read More...

  • October 29, 2014

    Global Security Standard to be Developed by Vendors

    Read More...

  • October 29, 2014

    Hackers Reportedly Breached White House Network

    Wave's CTO Greg Kazmierczak chimes in on the latest high-profile attack - an unclassified White House network breach.  Greg added: " Even after shutting down part of the network, there would still be an effort to track down the source of the attack.  The decision to temporarily shut down the network was probably dictated by a combination of the type of attack, the remediation required and whether additional data could be lost during the remediation process."

    Read the full article

    Read More...

  • October 29, 2014

    What's Causing the Recent String of Data Breaches? Micron Talks to Wave Systems' Data Security Expert to Uncover the Answer

    It’s Cyber Security Awareness month, which begs the question: are we doing all we can to protect our data? In hopes of answering that question, Micron’s Jon Tanguy sat down with Girish Bhat – one of Wave’s collaborators with Micron – to talk all things encryption. In this Micron blog, Girish sheds some light on how data breaches have evolved over the last few years, and waxes poetic about the role of hardware encryption within the bigger “security package,” stressing the importance of standards and specifications to securing user data.

    Read More...

  • October 27, 2014

    Why Software Does Not Sufficiently Protect Against Targeted Attacks

    Wave’s CTO EMEA talks to Funkschau about the insufficiency of software against targeted attacks, he defines APTs, points to ways the reader can provide the earliest possible protection and why hardware-based software should be preferred over software-based protection.

    Read Full Article

    Read More...

  • October 14, 2014

    Choose Security Over Convenience for Authentication

    Aware that consumer data is compromised in massive data breaches in what seems like every other week, Mr. Bradley explores what companies should expect and how they can prevent data breaches. Using Wave’s branded infographic dubbed, “Four Authentication Definitions Every IT Security Pro Should Know,” he is able to further highlight the importance of two-factor authentication, showcasing it with the graphic’s four educational panels: “Something You Know,” “Something You Have,” “Something You Are,” and “Two-Factor Authentication.”

    Read More...