Jul 30, 2020 Securing data while in use opens doors from the on-prem data center to the cloud for more applications. According to a survey at June's Linux Foundation Open Source Summit by the Confidential Computing Consortium, only 30 percent of attendees have heard of the technology, but it’s promising to change the way the more security-conscious organizations view public cloud infrastructure.
Jul 28, 2020 In most industries, businesses are evaluating and kicking off digital transformation initiatives to see how they might gain competitive advantage, improve customer experience, and increase profitability. In many cases, technology can be used in digital transformation to create new business models, digitize records, or leverage machine learning and artificial intelligence to improve results.
Jul 28, 2020 In the battle for security budget funding, enterprise key management isn’t nearly as sexy as technologies such as threat hunting or blockchain cybersecurity. Nevertheless, a key management system (KMS) is a behind-the-scenes workhorse that manages and protects the very keys that can open the kingdom.
Jul 24, 2020 As part of CRN’s Emerging Vendors for 2020, here are 55 hot security startups, founded in 2014 or later, that solution providers should be aware of.
July 20, 2020 Cloud technology companies are betting that businesses worried about being hacked will adopt a new computing technique to safeguard their most valuable information.
July 20, 2020 The hackers insinuated their way deep into Twitter’s internal system. They were able to get into a position from which they could access some 350 million Twitter accounts, including numerous accounts of the rich and famous. Ambuj Kumar's (Fortanix CEO) comments on recent hi-profile Twitter hack.
July 16, 2020 Twitter was thrown into chaos on Wednesday after accounts for some of the world’s most recognizable public figures, executives and celebrities starting tweeting out links to bitcoin scams. Twitter says the attack happened because someone tricked or coerced an employee into providing access to internal Twitter administrative tools. This post is an attempt to lay out some of the timeline of this attack, and point to clues about who may have been behind it.
July 2nd, 2020 Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully migrating and operating in public clouds. AWS Lambda, Azure Functions and Google Cloud are today’s market leading platforms for enterprises to realize the power and benefits of FaaS.
June 30th, 2020 The Confidential Computing Consortium, a Linux Foundation project and community dedicated to defining and accelerating the adoption of confidential computing, has announced Accenture, AMD, Anjuna, Anqlave, Cosmian, Facebook, iExec, IoTeX, Mellanox, NVIDIA, Oracle and R3 have joined as members of the Confidential Computing Consortium to contribute to the adoption of Confidential Computing.
June 30th, 2020 Fortanix is a consistent innovator in runtime encryption. They have recently concluded a collaboration with the Google Cloud Platform (GCP) that delivers an External Key Management System (EKMS) for the public cloud. The resulting solution enables businesses to migrate sensitive, private data to a public cloud environment without requiring them to give up control of their encryption keys.
June 29th, 2020 Linux Foundation’s Confidential Computing Consortium formed nine months ago, has grown 60% since then and added 10 new members in the last five months. Its other new members include Anjuna, Anqlave, Cosmian, iExec, IoTeX, and R3. They join founding members Alibaba, Arm, Google Cloud, Baidu, ByteDance, decentriq, Fortanix, Huawei, Intel, Kindite, Microsoft, Oasis Labs, Oracle, Red Hat, Swisscom, Tencent, and VMware.
June 29th, 2020 While no one holds a crystal ball, it’s pretty easy to look at the numerous data privacy regulations both around the globe, and in individual US states, and see the growing trend around protecting data privacy and enforcing compliance. More and more regulatory bodies are establishing regulations to protect consumers’ personal data and confidential information that is used in organizations.
June 26th, 2020 What is confidential computing, and how can it help protect organisations? In this week’s episode, we talk to Dr Richard Searle, senior security architect at Fortanix and general member’s representative to the governing board of the consortium, about what the technology aims to do.
June 16th, 2020 Fortanix® Inc, a Runtime Encryption® company has expanded operations in the Asia Pacific region, fulfilling the growing global demand for its data security solutions. Having invested heavily in Asia Pacific, the company recently unveiled a new in-region staff and growing ecosystem of channel and distribution partners, enabling organisations to improve on-premises and cloud data security, all while lowering costs and reducing complexity of legacy systems.
June 16th, 2020 Fortanix has expanded its operations in the Asia Pacific region to continue meeting the growing global demand for its data security solutions.
June 16th, 2020 Data security solutions vendor Fortanix is gearing up for a fresh run at the Asia Pacific market, launching a new expansion effort in the region, signing new distribution agreements and recruiting new partners to take its solutions to market. Inks distribution deals with ACA Pacific, Nextgen Distribution, Vietsoft and i-Value, among others.
June 3rd, 2020 Confidential computing is an emerging industry initiative focused on helping to secure data in use. But how does one separate hype from reality? In part one of a two-part podcast, Richard Curran of Intel leads an expert panel discussion on the concept of confidential computing.nes mobile operating system, Bluetooth and GPS technologies to help us all get past the burgeoning health crisis.
May 29th, 2020 Apple and Google are partnering up to bring technology to bear on COVID-19 contact tracing efforts. The tech giants are laudably putting aside any competitive urgings to co-develop a solution that combines mobile operating system, Bluetooth and GPS technologies to help us all get past the burgeoning health crisis.
May 29th, 2020 “So assume someone who takes a busy public transport to a big office building for work, and for fun declares themselves infected,” says Kumar. “This will create lots of alerts. Unfortunately, you only need a handful of these trolls who can overwhelm the system with all the false positives.”
May 28th, 2020 Development and deployment of container-based software has become a popular movement in technology. Docker, and container technology in general, has redefined cloud computing and offers significant benefits to developers and companies, including efficiency, cost savings, consistency, reliability, and scalability for the entire DevOps processes.
May 27th, 2020 Fortanix is offerings legacy enterprise firms a less disruptive way to deliver reliable end-to-end security across hybrid environments. IDN looks at how Fortanix HSM Gateway integrates cloud apps and databases with legacy on-premises security.
May 27th, 2020 Big tech companies are adopting a new security model called confidential computing to protect data while it’s in use. A handful of major technology companies are going all in on a new security model they’re calling confidential computing in an effort to better protect data in all its forms.
May 21, 2020 At this week’s Build virtual event, Microsoft announced new Identity and Azure features meant to improve security for both application developers and enterprise customers. For developers, admins, and end-users alike, new Identity capabilities to help foster a secure and trustworthy app ecosystem include Publisher Verification, app consent policies, and general availability of Microsoft authentication libraries (MSAL) for Angular.
May 19, 2020 One of the most important things to do in a digital setup is to avoid any forms of blunders related to security. However, ensuring that an app developer doesn’t have direct control over the security of a system goes a long way in ensuring that an app is fully secure.
May 19, 2020 The Fortanix Confidential Computing Enclave Manager™ empowers organizations dealing with sensitive and regulated data to ensure and enhance security while the data is in use.
May 18, 2020 Fortanix today announced that a software-as-a-service (SaaS) platform for managing instances of confidential computing on the Microsoft Azure cloud is now generally available.
May 18, 2020 With hackers becoming more successful by the day and organizations looking to protect themselves from becoming the next victim, they might consider the new Fortanix Confidential Computing Enclave Manager, a SaaS offering that enables applications to run in confidential computing environments, verifies the integrity of those environments, and manages the application lifecycle for secure enclaves running on Microsoft Azure confidential computing DCsv2-series VMs.
May 7, 2020 One of the many issues that keeps CISOs up at night is the realization that no matter how robust and comprehensive their cybersecurity is, their IT systems are likely to be breached at some point.
May 4, 2020 The deployment of Fortanix Data Security Platform on Azure will enhance data protection and drive seamless migration to the public cloud. The Runtime Encryption Company, Fortanix, announced that its Self-Defending Key Management Service™ (KMS) will now be running on Microsoft Azure.
May 4, 2020 Fortanix, a Runtime Encryption company, announced the availability of the Fortanix Self-Defending Key Management Service running on Microsoft Azure to help customers protect private data in the public cloud.
Apr 30, 2020 The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have nearly limitless compute and storage resources at our fingertips. One may think of this as the first wave of automation within the application development and deployment process.
Apr 27, 2020 Microsoft today made available Azure confidential computing built on Intel hardware for enterprise cloud customers. It follows a similar IBM Cloud move last week.
Apr 24, 2020 Integrating cloud applications and databases with legacy on-premises Hardware Security Modules (HSMs), Fortanix announced the availability of the Fortanix HSM Gateway™ solution to provide enhanced data security.
Apr 23, 2020 Fortanix, the Runtime Encryption company, announced the availability of the Fortanix HSM Gateway, a new extension to the Fortanix Self-Defending Key Management Service.
Apr 22, 2020 IBM today announced the general availability of IBM Cloud Data Shield, a service built to better protect business applications while information is at rest, in transit, and in use. The platform, developed in a partnership with Fortanix, relies on confidential computing, a technology gaining traction as more organizations seek new ways to secure their sensitive data in the cloud.
Apr 22, 2020 The offer coincides with the new Fortanix HSM Gateway. Fortanix today announced the new Fortanix Legacy HSM Replacement program. The free trial program lets partners offer customers a migration path from their legacy hardware security modules (HSMs).
Apr 22, 2020 IBM doubled down on confidential computing with Fortanix and said its Fortanix-powered IBM Cloud Data Shield now supports containerized applications IBM Cloud Kubernetes and RedHat OpenShift. This allows businesses to move and secure applications in the public cloud by running them in a secure enclave on Intel Software Guard Extension (SGX) hardware.
Apr 21, 2020 In 2020, enterprises need to look to new encryption technologies paired with key management to protect sensitive data, particularly in cloud and multi-cloud environments. The current macro-economic climate fueled by the COVID-19 pandemic is forcing even more enterprises to move their sensitive workloads to public cloud.
Apr 17, 2020 A major feature of the current COVID-19 crisis has been the sudden growth of state control and influence on everyday lives. Whilst most would agree measures such as nationwide lockdowns are a short-term necessity, it has highlighted how governments are able to give themselves potentially chilling new powers to wield at very short notice, aided by modern technology.
Apr 08, 2020 The concept of the agile and remote worker has become more prevalent in recent years, as consumer Wi-Fi becomes more faster, we carry corporate laptops or BYOD-permitted smartphones, and realize we don’t all need access to a printer and fax machine.
Apr 02, 2020 We live in a world where data is transmitted back and forth all the time. We also live in a world where people want to get access to that data wherever they can. Things like bank account numbers, credit card info, or confidential patient data are all highly valuable. We’ve worked hard to secure the data when it is being transmitted with protocols like SSL and TLS. Once those were in place, attackers started looking for data hiding in the storage media. Now we encrypt data wherever it rests. But that’s still not enough.
March 30th, 2020 In just a handful of years, the use of cloud computing has transitioned from being a leading-edge strategy to a standard business practice. The efficiency, agility and reduced overheads created by cloud-based services are swiftly becoming essential if an organisation is to remain profitable and competitive.
Mar 30, 2020
Last week Infosecurity explored the immediate impact of COVID-19 on the cybersecurity industry, and what experts felt would be the short-term significance.
David Greene, chief revenue officer at Fortanix, said that this will allow businesses to get the right cybersecurity systems and processes in place if they can, so “we can all be ready for what comes next.”
March 27th, 2020 The study, which was carried out in partnership with runtime encryption company, Fortanix, throws light on how encryption can significantly help organisations to mitigate risk, when it comes to falling foul of the CCPA which came into effect on the first day of 2020.
March 27th, 2020 As technology companies and the medical community work to find ways to track and test for the virus, privacy might fall by the wayside. In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus.
March, 2020 Data security in the cloud has often been assumed, but now it needs to be assured. Dr Richard Searle, Senior Security Architect at Fortanix explains how to take back control. In a drive to streamline processes and improve cost efficiency, organisations are entrusting an ever-increasing amount of sensitive data to public cloud providers.
Mar 26, 2020 The report highlights that encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA.
Mar 26, 2020 Enterprise Strategy Group (ESG) – an IT analyst, research, validation and strategy firm – and Fortanix® Inc., the Runtime Encryption® company, today announced results of the ESG industry report focused on compliance guidelines for the California Consumer Privacy Act (CCPA).
Mar 26, 2020 As we work remotely and isolate ourselves from friends and colleagues as best we can, the impacts of COVID-19 will continue to hit the technology sector in terms of output and innovation.
Mar 26, 2020 Organizations collecting and maintaining personal information about California and New York residents should be paying attention to what is happening with the states’ consumer privacy laws.
Mar 26, 2020 Encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA, according to ESG and Fortanix.
Mar 18, 2020 Firms in retail, manufacturing, logistics and more are embracing cloud computing in one form or another but it’s in the financial services sector where deployment is proving a particularly complex matter. The use of multi-cloud infrastructures is also disproportionately higher, driven by a range of business and technology considerations. That creates a number of challenges – challenges that can only be solved in that most pervasive of environments: the hardware.
Mar 12, 2020 Video recording of Fortanix CEO's interview with Digital Anarchist.
Mar 7, 2020 When it comes to confidential computing, Microsoft, Intel, and Fortanix weren’t speaking in whispers at RSA Conference. The three companies are all founding members of the Confidential Computing Consortium. And in addition to hosting a panel about the topic at the annual security conference, company executives stressed the importance of confidential computing in their own security events, during interviews, and on the show floor at RSA.
Mar 6, 2020 Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.
Mar 5, 2020 Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.
Mar 2, 2020 Ambuj Kumar of Fortanix further put the matter into perspective, sharing that “infrastructure is far too complex to be secure. It includes so much software, from OS to driver to users to endpoints that inevitably something will be vulnerable.
Feb 27, 2020 Anand Kashyap is the chief technology officer at Fortanix, a US-based cybersecurity firm. Founded in 2016, the startup specialises in encrypting data in use. While traditional encryption protects data at rest and data in motion, Fortanix’s RunTime Encryption platform allows applications to run using encrypted data, securing it while it is vulnerable to a variety of attacks.
Feb 24, 2020 To bring oversight & control of security back into the business implement a centralised cloud strategy, encrypt sensitive data across all cloud providers themselves and manage it in one place.
Feb 24, 2020 If putting unencrypted data up in a public cloud is like leaving your house unlocked, keeping encrypted data and the encryption keys in the same cloud could be akin to leaving a copy of your housekey under your doormat.
Feb 24, 2020 Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.
Feb 21, 2020 Shadow digital minister Chi Onwurah challenges the government to stop Google’s plans to move UK user data out of the EU.
Feb 11, 2020 Following the news regarding the US charging four Chinese military officers over the huge Equifax breach, Ambuj Kumar, CEO and co-founder of Fortanix commented below.
Feb 11, 2020 The cloud is now a common storage realm for companies that want to scale their data while making use of usually large capacities. However, some of the newest cyber attacks around right now are increasingly targeting the cloud, particularly cloud applications. Jethro Beekman, technical director at Fortanix, said: “Cloud migration and the ineffectiveness of perimeter defences have led to an increase of host- and service-based security mechanisms.
Feb 11, 2020 At least one security expert highlighted how some nation states have been conducting cyber warfare operations for a while now, rather than make use of conventional military operations. “Compared to conventional war, cyber warfare offers more precision. One can control exactly what and whom to target. Also, it’s much less expensive,” said Ambuj Kumar, CEO and co-founder of Fortanix.
Feb 10, 2020 From Ambuj Kumar, CEO & Co-Founder, Fortanix: Compared to conventional war, cyber warfare offers more precision. One can control exactly what and whom to target. Also, it’s much less expensive. This is why we will see more and more instances of cyber battles in future.
January 24th, 2020 Three years ago, the NotPetya ransomware wreaked over $10 billion in damage. Crafted by the Russian military, the malware relied on a nearly decade-old code named Mimikatz. It highlighted an ongoing Windows flaw that could expose users’ passwords left as cleartext in system memory. Even today, any exploitable system that hosts multiple users stands ready to expose those passwords to hackers, who can then seize that data and use it to log into adjacent exploitable systems.
January 21th, 2020 Despite just being at the company for a short time, Faiyaz Shahpurwala, chief product officer at Fortanix, has been focused on delivering product and strategy. However, as a security expert, he took some time out to talk to us about his experience in the industry along with the announcement of a new form of security that could change so much in encryption.
January 17th, 2020 Microsoft has already issued a patch for the latest Windows vulnerability, which organizations should apply right away to avoid exposure to malware.
January 15th, 2020 Overnight, Microsoft announced a patch for a vulnerability discovered by the NSA in Windows 10. The vulnerability could have been exploited by hackers to create malicious software that looked legitimate.
January 10th, 2020 According to Gartner, 70% of businesses are adopting a hybrid cloud and multi-cloud strategy to augment their internal data centers. The challenges of protecting data and using encryption for multiple hybrid, public cloud, and on-premises environments increases complexity, cost, and security risk. Interview with Ambuj Kumar, Fortanix CEO for Security Weekly podcast.
January 8th, 2020 Secure enclaves can help reduce data breaches dramatically and support the value of the cloud securely.
January 6th, 2020 The California Consumer Privacy Act (CCPA) came into force on January 1st 2020 and requires impacted organizations to take various compliance measures to avoid potentially large fines. One of the key steps that organizations can take to manage the associated risks is to implement an holistic approach to encryption: as Anand Kashyap, CTO and co-founder at Fortanix explains.