April 2nd, 2021 Fortanix has announced the Fortanix Partners First program, a new channel partner program that enables resellers to grow their business by helping customers protect their data in the cloud.
April 1st, 2021 Fortanix partners now have access to the company’s first partner program led by its new area vice president of Americas channels Scott Hoard.
March 3rd, 2021 With so much automation in code writing process, results are rarely double-checked, which opens the door to vulnerabilities and downright danger.
March 2nd, 2021 In a digital economy fueled by AI, data transparency is the new currency. Learn what IT leaders must do to bring trust and transparency to the enterprise, now and into the future.
February 3rd, 2021 So given that he has decided to step down as CEO, this seems like a good time to reflect on his insights and wisdom.
February 3rd, 2021 Jassy was the natural heir apparent to Amazon’s CEO role, according to Ambuj Kumar, CEO and co-founder of Fortanix, a Mountain View, Calif.-based multi-cloud security company and AWS partner.
February 1st, 2021 Fortanix is offering a solution to help businesses secure private data as they migrate to the public cloud. Fortanix Cloud Data Control applies consistent encryption key management policies across targets and offers customers a single point of control.
January 21, 2021 Pat Gelsinger has a massive task ahead of him when he takes over as Intel CEO next month.
January 19, 2021 CloudSphere, Fortanix and MontyCloud all talk about what’s at stake and what partners must do now.
January 16, 2021 During the past few years, there has been a surge in the stock prices of mega big tech companies like Apple, Microsoft, and Adobe. But of course, some have been left out of the party.
January 14, 2021 Newly appointed Intel CEO Pat Gelsinger brings technical chops to the top of the giant chip maker, but it may take a while to right the ship. Does he have enough time?
January 12, 2021 The partnership between UCSF, Fortanix, Microsoft, and Intel aims to overcome the data privacy issues that inhibit the development of the broad data sets necessary for reliable clinical algorithms.
December 23rd, 2020 Ambuj Kumar is CEO of Fortanix, data-first multicloud security company that solves cloud security and privacy, using Confidential Computing.
December 11th, 2020 Healthcare is one industry that hasn’t been served particularly well by AI. But due to the innovation of confidential computing, clinical AI algorithms are on the rise and poised to improve healthcare for years to come. Ambuj Kumar, CEO of Fortanix, elaborates on the future of AI in this exclusive article for Toolbox.
December 9th, 2020 Fortanix announced Fortanix Cloud Data Control, a new solution that helps businesses secure private data as they migrate to public cloud. Available for use across AWS, Google Cloud, and Microsoft Azure - it is the only solution on the market that can apply consistent encryption key management policies across multiple cloud providers, tenants, and regions while enabling keys from any cloud or on-premises Hardware Security Module (HSM) to encrypt data anywhere.
December 1st, 2020 While valuable, secrets management also can be difficult for DevOps teams to employ. Here’s what you need to know
November 25th, 2020 Tech companies are offering this emerging technology to help financial institutions secure data while it is being processed.
November 18, 2020 In this article, we will take a closer look at Google’s Cloud Key Management Services. When users store data into Google Cloud, the data is automatically encrypted at rest. We use Google’s Cloud Key Management service to gain better control over managing the encrypted data-at-rest and encryption keys.
November 16, 2020 What is confidential computing? There are ways to encrypt your data at rest and while in transit, but confidential computing protects the confidentiality and integrity of your data while it is in use.
November 11, 2020 With its Self-Defending Key Management Service, Fortanix offers a unified management approach covering encryption, keys, secrets and tokenization. The service, which spans multi-cloud infrastructures, provides cryptographic operations and life-cycle management such as key generation and key rotation.
November 1st, 2020 Fortanix is a startup that offered the first commercially available runtime encryption back in 2017 using Intel® SGX (a set of security-related instruction codes that are built into some modern Intel central processing units).
October 29, 2020 We didn't have to do what we did to TikTok. We turned it into a political football that was kicked back and forth, with no real solution in sight.
October 26, 2020 Above the Trend Line: your industry rumor central is a recurring feature of insideBIGDATA. In this column, we present a variety of short time-critical news items grouped by category such as M&A activity, people movements, funding news, industry partnerships, customer wins, rumors and general scuttlebutt floating around the big data, data science and machine learning industries including behind-the-scenes anecdotes and curious buzz.
October 23, 2020 Here are 11 recent partnerships between healthcare organizations and big tech companies including Amazon, Apple, Google and Microsoft.
October 15, 2020 From new partnerships to asset sales to novel cybersecurity initiatives, here's the latest roundup of stories about health IT companies, including Epic, Allscripts and Amazon.
October 15, 2020 The upcoming 3rd Gen Xeon Scalable processor will widely expand applicability of Intel SGX secure enclaves in data centers.
October 14, 2020 Intel SGX and Fortanix Confidential Computing Enclave Manager were leveraged by NEC to create a confidential computing system to more securely share, analyze and manage customer data, while also facilitating better collaboration with partners.
October 14, 2020 The University of California San Francisco’s (UCSF) Center for Digital Health Innovation (CDHI) is using Intel® Software Guard Extensions (Intel® SGX) featured in Intel® Xeon® E processors and Fortanix® Confidential Computing Enclave Manager to help streamline certification of breakthrough medical devices with embedded artificial intelligence (AI) capabilities.
October 14, 2020 New Security Innovations Include Intel SGX, Memory Encryption, Firmware Resilience and Breakthrough Cryptographic Accelerators
October 14, 2020 Now we‘re really bringing it to the [Xeon] Scalable processors for the first time, in a much bigger way,’ an Intel fellow tells CRN of the expanded security capabilities for the upcoming third-generation Xeon Scalable processors, which includes Total Memory Encryption and larger Intel SGX enclaves.
October 14, 2020 Today, Intel unveiled key security innovations for its upcoming 3rd Generation Intel Xeon platform—codenamed “Ice Lake.” The new security capabilities include Intel Software Guard Extension (SGX), Intel Total Memory Encryption (Intel TME), Intel Platform Resilience (Intel PFR), and cryptographic accelerators that improve data confidentiality and integrity overall.
October 12, 2020 UCSF, in partnership with Fortanix, Intel, and Microsoft, will announce BeeKeeperAI, a Privacy-Preserving Analytics Platform that will accelerate the development of clinical AI algorithms by 1000X (from 30 months to 1 day).
October 08, 2020 The data analytics platform will protect the privacy of clinical information to accelerate artificial intelligence in healthcare.
October 09, 2020 UC San Francisco’s Center for Digital Health Innovation (CDHI), Fortanix, Intel, and Microsoft Azure have formed a collaboration to establish a confidential computing platform with privacy-preserving analytics to accelerate the development and validation of clinical algorithms.
October 08, 2020 Advanced Development of Additive Manufacturing, a 3D-bioprinting company headquartered in Groton, Conn., has been pioneering an on-demand tissue manufacturing solution as a service model.
October 08, 2020 University of California San Francisco teamed Microsoft Azure, Intel and Fortanix to establish a confidential computing platform that will accelerate the development and validation of clinical algorithms.
October 07, 2020 The organizations say they expect the platform, announced Wednesday, to reduce the time and cost associated with creating clinical grade AI algorithms while maintaining data security.
October 05, 2020 According to Gartner, 81 percent of businesses are adopting a hybrid cloud and multi-cloud strategy. The challenges of protecting data and using encryption across public/private cloud, SaaS, and on-premises environments increase complexity, cost and security risk.
October 05, 2020 The Confidential Computing Consortium, formed under The Linux Foundation, could revolutionize the way companies share data. Tom Merritt lists five things to know about Confidential Computing.
October 01, 2020 Customers deploying applications in the cloud face major security challenges today. Cloud providers treat cloud security as a mutual obligation. The cloud providers are responsible for the infrastructure security of the cloud, and the customer covers the security of what data and application they put in the cloud.
October 01, 2020 Fortanix, the data-first multicloud security™ company, announced that it is partnering with VMware to integrate Fortanix Self-Defending Key Management Service (KMS) with VMware Cloud Director™ to enable VMware cloud partners to deliver a broad set of differentiated data security services focused on better securing data throughout its lifecycle.
September 30, 2020 SAN FRANCISCO, September 30th, 2020 – Fortanix® Inc., the data-first multicloud security™ company, today announced that it is partnering with VMware to integrate Fortanix Self-Defending Key Management Service (KMS) with VMware Cloud Director™ to enable VMware cloud partners to deliver a broad set of differentiated data security services focused on better securing data throughout its lifecycle.
September 14, 2020 According to the Confidential Computing Consortium: “Confidential computing is the protection of data in use using hardware-based Trusted Execution Environments (TEE). A Trusted Execution Environment is commonly defined as an environment that provides a level of assurance of data integrity, data confidentiality, and code integrity. A hardware-based TEE uses hardware-backed techniques to provide increased security guarantees for the execution of code and protection of data within that environment.”
Jul 30, 2020 Securing data while in use opens doors from the on-prem data center to the cloud for more applications. According to a survey at June's Linux Foundation Open Source Summit by the Confidential Computing Consortium, only 30 percent of attendees have heard of the technology, but it’s promising to change the way the more security-conscious organizations view public cloud infrastructure.
Jul 28, 2020 In most industries, businesses are evaluating and kicking off digital transformation initiatives to see how they might gain competitive advantage, improve customer experience, and increase profitability. In many cases, technology can be used in digital transformation to create new business models, digitize records, or leverage machine learning and artificial intelligence to improve results.
Jul 28, 2020 In the battle for security budget funding, enterprise key management isn’t nearly as sexy as technologies such as threat hunting or blockchain cybersecurity. Nevertheless, a key management system (KMS) is a behind-the-scenes workhorse that manages and protects the very keys that can open the kingdom.
Jul 24, 2020 As part of CRN’s Emerging Vendors for 2020, here are 55 hot security startups, founded in 2014 or later, that solution providers should be aware of.
July 20, 2020 Cloud technology companies are betting that businesses worried about being hacked will adopt a new computing technique to safeguard their most valuable information.
July 20, 2020 The hackers insinuated their way deep into Twitter’s internal system. They were able to get into a position from which they could access some 350 million Twitter accounts, including numerous accounts of the rich and famous. Ambuj Kumar's (Fortanix CEO) comments on recent hi-profile Twitter hack.
July 16, 2020 Twitter was thrown into chaos on Wednesday after accounts for some of the world’s most recognizable public figures, executives and celebrities starting tweeting out links to bitcoin scams. Twitter says the attack happened because someone tricked or coerced an employee into providing access to internal Twitter administrative tools. This post is an attempt to lay out some of the timeline of this attack, and point to clues about who may have been behind it.
July 2nd, 2020 Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully migrating and operating in public clouds. AWS Lambda, Azure Functions and Google Cloud are today’s market leading platforms for enterprises to realize the power and benefits of FaaS.
June 30th, 2020 The Confidential Computing Consortium, a Linux Foundation project and community dedicated to defining and accelerating the adoption of confidential computing, has announced Accenture, AMD, Anjuna, Anqlave, Cosmian, Facebook, iExec, IoTeX, Mellanox, NVIDIA, Oracle and R3 have joined as members of the Confidential Computing Consortium to contribute to the adoption of Confidential Computing.
June 30th, 2020 Fortanix is a consistent innovator in runtime encryption. They have recently concluded a collaboration with the Google Cloud Platform (GCP) that delivers an External Key Management System (EKMS) for the public cloud. The resulting solution enables businesses to migrate sensitive, private data to a public cloud environment without requiring them to give up control of their encryption keys.
June 29th, 2020 Linux Foundation’s Confidential Computing Consortium formed nine months ago, has grown 60% since then and added 10 new members in the last five months. Its other new members include Anjuna, Anqlave, Cosmian, iExec, IoTeX, and R3. They join founding members Alibaba, Arm, Google Cloud, Baidu, ByteDance, decentriq, Fortanix, Huawei, Intel, Kindite, Microsoft, Oasis Labs, Oracle, Red Hat, Swisscom, Tencent, and VMware.
June 29th, 2020 While no one holds a crystal ball, it’s pretty easy to look at the numerous data privacy regulations both around the globe, and in individual US states, and see the growing trend around protecting data privacy and enforcing compliance. More and more regulatory bodies are establishing regulations to protect consumers’ personal data and confidential information that is used in organizations.
June 26th, 2020 What is confidential computing, and how can it help protect organisations? In this week’s episode, we talk to Dr Richard Searle, senior security architect at Fortanix and general member’s representative to the governing board of the consortium, about what the technology aims to do.
June 16th, 2020 Fortanix® Inc, a Runtime Encryption® company has expanded operations in the Asia Pacific region, fulfilling the growing global demand for its data security solutions. Having invested heavily in Asia Pacific, the company recently unveiled a new in-region staff and growing ecosystem of channel and distribution partners, enabling organisations to improve on-premises and cloud data security, all while lowering costs and reducing complexity of legacy systems.
June 16th, 2020 Fortanix has expanded its operations in the Asia Pacific region to continue meeting the growing global demand for its data security solutions.
June 16th, 2020 Data security solutions vendor Fortanix is gearing up for a fresh run at the Asia Pacific market, launching a new expansion effort in the region, signing new distribution agreements and recruiting new partners to take its solutions to market. Inks distribution deals with ACA Pacific, Nextgen Distribution, Vietsoft and i-Value, among others.
June 3rd, 2020 Confidential computing is an emerging industry initiative focused on helping to secure data in use. But how does one separate hype from reality? In part one of a two-part podcast, Richard Curran of Intel leads an expert panel discussion on the concept of confidential computing.nes mobile operating system, Bluetooth and GPS technologies to help us all get past the burgeoning health crisis.
May 29th, 2020 Apple and Google are partnering up to bring technology to bear on COVID-19 contact tracing efforts. The tech giants are laudably putting aside any competitive urgings to co-develop a solution that combines mobile operating system, Bluetooth and GPS technologies to help us all get past the burgeoning health crisis.
May 29th, 2020 “So assume someone who takes a busy public transport to a big office building for work, and for fun declares themselves infected,” says Kumar. “This will create lots of alerts. Unfortunately, you only need a handful of these trolls who can overwhelm the system with all the false positives.”
May 28th, 2020 Development and deployment of container-based software has become a popular movement in technology. Docker, and container technology in general, has redefined cloud computing and offers significant benefits to developers and companies, including efficiency, cost savings, consistency, reliability, and scalability for the entire DevOps processes.
May 27th, 2020 Fortanix is offerings legacy enterprise firms a less disruptive way to deliver reliable end-to-end security across hybrid environments. IDN looks at how Fortanix HSM Gateway integrates cloud apps and databases with legacy on-premises security.
May 27th, 2020 Big tech companies are adopting a new security model called confidential computing to protect data while it’s in use. A handful of major technology companies are going all in on a new security model they’re calling confidential computing in an effort to better protect data in all its forms.
May 21, 2020 At this week’s Build virtual event, Microsoft announced new Identity and Azure features meant to improve security for both application developers and enterprise customers. For developers, admins, and end-users alike, new Identity capabilities to help foster a secure and trustworthy app ecosystem include Publisher Verification, app consent policies, and general availability of Microsoft authentication libraries (MSAL) for Angular.
May 19, 2020 One of the most important things to do in a digital setup is to avoid any forms of blunders related to security. However, ensuring that an app developer doesn’t have direct control over the security of a system goes a long way in ensuring that an app is fully secure.
May 19, 2020 The Fortanix Confidential Computing Enclave Manager™ empowers organizations dealing with sensitive and regulated data to ensure and enhance security while the data is in use.
May 18, 2020 Fortanix today announced that a software-as-a-service (SaaS) platform for managing instances of confidential computing on the Microsoft Azure cloud is now generally available.
May 18, 2020 With hackers becoming more successful by the day and organizations looking to protect themselves from becoming the next victim, they might consider the new Fortanix Confidential Computing Enclave Manager, a SaaS offering that enables applications to run in confidential computing environments, verifies the integrity of those environments, and manages the application lifecycle for secure enclaves running on Microsoft Azure confidential computing DCsv2-series VMs.
May 7, 2020 One of the many issues that keeps CISOs up at night is the realization that no matter how robust and comprehensive their cybersecurity is, their IT systems are likely to be breached at some point.
May 4, 2020 The deployment of Fortanix Data Security Platform on Azure will enhance data protection and drive seamless migration to the public cloud. The Runtime Encryption Company, Fortanix, announced that its Self-Defending Key Management Service™ (KMS) will now be running on Microsoft Azure.
May 4, 2020 Fortanix, a Runtime Encryption company, announced the availability of the Fortanix Self-Defending Key Management Service running on Microsoft Azure to help customers protect private data in the public cloud.
Apr 30, 2020 The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have nearly limitless compute and storage resources at our fingertips. One may think of this as the first wave of automation within the application development and deployment process.
Apr 27, 2020 Microsoft today made available Azure confidential computing built on Intel hardware for enterprise cloud customers. It follows a similar IBM Cloud move last week.
Apr 24, 2020 Integrating cloud applications and databases with legacy on-premises Hardware Security Modules (HSMs), Fortanix announced the availability of the Fortanix HSM Gateway™ solution to provide enhanced data security.
Apr 23, 2020 Fortanix, the Runtime Encryption company, announced the availability of the Fortanix HSM Gateway, a new extension to the Fortanix Self-Defending Key Management Service.
Apr 22, 2020 IBM today announced the general availability of IBM Cloud Data Shield, a service built to better protect business applications while information is at rest, in transit, and in use. The platform, developed in a partnership with Fortanix, relies on confidential computing, a technology gaining traction as more organizations seek new ways to secure their sensitive data in the cloud.
Apr 22, 2020 The offer coincides with the new Fortanix HSM Gateway. Fortanix today announced the new Fortanix Legacy HSM Replacement program. The free trial program lets partners offer customers a migration path from their legacy hardware security modules (HSMs).
Apr 22, 2020 IBM doubled down on confidential computing with Fortanix and said its Fortanix-powered IBM Cloud Data Shield now supports containerized applications IBM Cloud Kubernetes and RedHat OpenShift. This allows businesses to move and secure applications in the public cloud by running them in a secure enclave on Intel Software Guard Extension (SGX) hardware.
Apr 21, 2020 In 2020, enterprises need to look to new encryption technologies paired with key management to protect sensitive data, particularly in cloud and multi-cloud environments. The current macro-economic climate fueled by the COVID-19 pandemic is forcing even more enterprises to move their sensitive workloads to public cloud.
Apr 17, 2020 A major feature of the current COVID-19 crisis has been the sudden growth of state control and influence on everyday lives. Whilst most would agree measures such as nationwide lockdowns are a short-term necessity, it has highlighted how governments are able to give themselves potentially chilling new powers to wield at very short notice, aided by modern technology.
Apr 08, 2020 The concept of the agile and remote worker has become more prevalent in recent years, as consumer Wi-Fi becomes more faster, we carry corporate laptops or BYOD-permitted smartphones, and realize we don’t all need access to a printer and fax machine.
Apr 02, 2020 We live in a world where data is transmitted back and forth all the time. We also live in a world where people want to get access to that data wherever they can. Things like bank account numbers, credit card info, or confidential patient data are all highly valuable. We’ve worked hard to secure the data when it is being transmitted with protocols like SSL and TLS. Once those were in place, attackers started looking for data hiding in the storage media. Now we encrypt data wherever it rests. But that’s still not enough.
March 30th, 2020 In just a handful of years, the use of cloud computing has transitioned from being a leading-edge strategy to a standard business practice. The efficiency, agility and reduced overheads created by cloud-based services are swiftly becoming essential if an organisation is to remain profitable and competitive.
Mar 30, 2020
Last week Infosecurity explored the immediate impact of COVID-19 on the cybersecurity industry, and what experts felt would be the short-term significance.
David Greene, chief revenue officer at Fortanix, said that this will allow businesses to get the right cybersecurity systems and processes in place if they can, so “we can all be ready for what comes next.”
March 27th, 2020 The study, which was carried out in partnership with runtime encryption company, Fortanix, throws light on how encryption can significantly help organisations to mitigate risk, when it comes to falling foul of the CCPA which came into effect on the first day of 2020.
March 27th, 2020 As technology companies and the medical community work to find ways to track and test for the virus, privacy might fall by the wayside. In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus.
March, 2020 Data security in the cloud has often been assumed, but now it needs to be assured. Dr Richard Searle, Senior Security Architect at Fortanix explains how to take back control. In a drive to streamline processes and improve cost efficiency, organisations are entrusting an ever-increasing amount of sensitive data to public cloud providers.
Mar 26, 2020 The report highlights that encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA.
Mar 26, 2020 Enterprise Strategy Group (ESG) – an IT analyst, research, validation and strategy firm – and Fortanix® Inc., the Runtime Encryption® company, today announced results of the ESG industry report focused on compliance guidelines for the California Consumer Privacy Act (CCPA).
Mar 26, 2020 As we work remotely and isolate ourselves from friends and colleagues as best we can, the impacts of COVID-19 will continue to hit the technology sector in terms of output and innovation.
Mar 26, 2020 Organizations collecting and maintaining personal information about California and New York residents should be paying attention to what is happening with the states’ consumer privacy laws.
Mar 26, 2020 Encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA, according to ESG and Fortanix.
Mar 18, 2020 Firms in retail, manufacturing, logistics and more are embracing cloud computing in one form or another but it’s in the financial services sector where deployment is proving a particularly complex matter. The use of multi-cloud infrastructures is also disproportionately higher, driven by a range of business and technology considerations. That creates a number of challenges – challenges that can only be solved in that most pervasive of environments: the hardware.
Mar 12, 2020 Video recording of Fortanix CEO's interview with Digital Anarchist.
Mar 7, 2020 When it comes to confidential computing, Microsoft, Intel, and Fortanix weren’t speaking in whispers at RSA Conference. The three companies are all founding members of the Confidential Computing Consortium. And in addition to hosting a panel about the topic at the annual security conference, company executives stressed the importance of confidential computing in their own security events, during interviews, and on the show floor at RSA.
Mar 6, 2020 Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.
Mar 5, 2020 Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.
Mar 2, 2020 Ambuj Kumar of Fortanix further put the matter into perspective, sharing that “infrastructure is far too complex to be secure. It includes so much software, from OS to driver to users to endpoints that inevitably something will be vulnerable.
Feb 27, 2020 Anand Kashyap is the chief technology officer at Fortanix, a US-based cybersecurity firm. Founded in 2016, the startup specialises in encrypting data in use. While traditional encryption protects data at rest and data in motion, Fortanix’s RunTime Encryption platform allows applications to run using encrypted data, securing it while it is vulnerable to a variety of attacks.
Feb 24, 2020 To bring oversight & control of security back into the business implement a centralised cloud strategy, encrypt sensitive data across all cloud providers themselves and manage it in one place.
Feb 24, 2020 If putting unencrypted data up in a public cloud is like leaving your house unlocked, keeping encrypted data and the encryption keys in the same cloud could be akin to leaving a copy of your housekey under your doormat.
Feb 24, 2020 Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.
Feb 21, 2020 Shadow digital minister Chi Onwurah challenges the government to stop Google’s plans to move UK user data out of the EU.
Feb 11, 2020 Following the news regarding the US charging four Chinese military officers over the huge Equifax breach, Ambuj Kumar, CEO and co-founder of Fortanix commented below.
Feb 11, 2020 The cloud is now a common storage realm for companies that want to scale their data while making use of usually large capacities. However, some of the newest cyber attacks around right now are increasingly targeting the cloud, particularly cloud applications. Jethro Beekman, technical director at Fortanix, said: “Cloud migration and the ineffectiveness of perimeter defences have led to an increase of host- and service-based security mechanisms.
Feb 11, 2020 At least one security expert highlighted how some nation states have been conducting cyber warfare operations for a while now, rather than make use of conventional military operations. “Compared to conventional war, cyber warfare offers more precision. One can control exactly what and whom to target. Also, it’s much less expensive,” said Ambuj Kumar, CEO and co-founder of Fortanix.
Feb 10, 2020 From Ambuj Kumar, CEO & Co-Founder, Fortanix: Compared to conventional war, cyber warfare offers more precision. One can control exactly what and whom to target. Also, it’s much less expensive. This is why we will see more and more instances of cyber battles in future.
January 24th, 2020 Three years ago, the NotPetya ransomware wreaked over $10 billion in damage. Crafted by the Russian military, the malware relied on a nearly decade-old code named Mimikatz. It highlighted an ongoing Windows flaw that could expose users’ passwords left as cleartext in system memory. Even today, any exploitable system that hosts multiple users stands ready to expose those passwords to hackers, who can then seize that data and use it to log into adjacent exploitable systems.
January 21th, 2020 Despite just being at the company for a short time, Faiyaz Shahpurwala, chief product officer at Fortanix, has been focused on delivering product and strategy. However, as a security expert, he took some time out to talk to us about his experience in the industry along with the announcement of a new form of security that could change so much in encryption.
January 17th, 2020 Microsoft has already issued a patch for the latest Windows vulnerability, which organizations should apply right away to avoid exposure to malware.
January 15th, 2020 Overnight, Microsoft announced a patch for a vulnerability discovered by the NSA in Windows 10. The vulnerability could have been exploited by hackers to create malicious software that looked legitimate.
January 10th, 2020 According to Gartner, 70% of businesses are adopting a hybrid cloud and multi-cloud strategy to augment their internal data centers. The challenges of protecting data and using encryption for multiple hybrid, public cloud, and on-premises environments increases complexity, cost, and security risk. Interview with Ambuj Kumar, Fortanix CEO for Security Weekly podcast.
January 8th, 2020 Secure enclaves can help reduce data breaches dramatically and support the value of the cloud securely.
January 6th, 2020 The California Consumer Privacy Act (CCPA) came into force on January 1st 2020 and requires impacted organizations to take various compliance measures to avoid potentially large fines. One of the key steps that organizations can take to manage the associated risks is to implement an holistic approach to encryption: as Anand Kashyap, CTO and co-founder at Fortanix explains.