Skip to main content
banner image
venafi logo

Encryption Stories We’re Reading Right Now

Encryption Stories We’re Reading Right Now

encryption, machine identity protection, breach
April 5, 2019 | Katrina Dobieski

Here are the encryption stories that intrigue us at the moment. We seek to find the most relevant pieces about encryption and give you an informative summary of the week’s security events.

In this edition, we uncover the surprising common denominator in last year’s biggest security breaches, establish how to move to cloud safely, and review the missing pins that lead to Wendy’s POS mis-adventure. Keep abreast of industry developments as we pull crucial news off the back shelf and shine coverage on the constantly evolving landscape that is encryption and machine identity protection.

Is Your Company’s Sensitive Data as Safe as You Think?

Microsoft_Logo_PNG.png

Could you put a dollar amount on the cost of your average “mega breach”?

If you guessed $350 million dollars, you’d be a good guesser. If you guessed $350 million dollars, a generation of public reputation, hard-won consumer trust and nail-biting PR control, you’d be a very good guesser.

2018 saw mega-corps like Google+, Facebook and British Airways take a plunge into the spiraling world of uber-leaks, and the missing parts are just starting to surface for the autopsy. So what was the answer? Human error.

“A recent study revealed that 47% of business leaders blamed human error for their company’s most recent data breach.”

Insufficient automation played an incriminating role, as many errors stem from manual processes that can be mechanized by proper machine identity protection solutions. Read the full article.

 

Your Data Is In The Cloud. What Is Your Last Line Of Defense Against Threats?

Microsoft_Logo_PNG.png

If your data is in the cloud, what happens if it rains? Rashi Mittal at SAP recommends a hefty encryption game-plan for any cloud-type migration. Her strategy:

  • Gain visibility of data being moved to the cloud
  • Decide if you plan to encrypt all data, or sensitive-only data
  • Make an encryption plan
  • Have a key management strategy

Citing the eminent risk of corporate data breaches, she singles out encryption as “your last line of defense.”Read the full article.

 

Wendy’s Breach Reaches $50+ Million in Settlements

What’s worse than stale fries? How about a $50 million dollar settlement over a three-year-old breach, washed down with a $3.4 million dollar class-action lawsuit.

So, where’s the beef?
With one of Wendy’s’ POS systems, apparently. It was hacked in 2015 and then again in 2016. Both times Wendy’s failed to notify the public.

The public responded by suing the corporation for not properly securing its systems, and the franchise recently reached the non-value menu price of $50 million in settlement charges. Wendy’s implicated “compromised third-party vendor credentials” as the likely culprit. The POS vendor remained unnamed.

Microsoft_Logo_PNG.png

Encrypt, Now
Despite added layers of regulation, adding encryption to POS systems may be crucial in mitigating effects. Bob Carr, CEO of Heartland Payment Systems, a formerly-breached POS provider, asserts “without tokenization and end-to-end encryption, payment data will still be vulnerable to attack and compromise.” Read the full article.

 

Are you doing enough to protect your machine identities?

 

Related posts

Like this blog? We think you will love this.
picture of a red boxing glove hitting a punching bag
Featured Blog

Facebook and the Fight for End-to-End Encryption [Encryption Digest 14]

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection
Industry Research

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Katrina Dobieski
Katrina Dobieski

Katrina writes for Venafi's blog and helps optimize Venafi's online presence to advance awareness of Machine Identity Protection.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat