Voltage Security Comments on Largest US Data Breach

Voltage Security Comments on Largest US Data Breach

Voltage Security Comments on Largest US Data BreachIn light of charges filed last week in a U.S. court against five cybercriminals in what’s being considered the largest-ever US data breach, Voltage Security cautions that the risk is still high but can be avoided with a data-centric security strategy.  Voltage customer Heartland Payment Systems Inc. was one of the companies involved in the attacks.

"It's good to see attackers prosecuted, but the fact is the damage is done - millions of dollars’ worth. More alarming is that these failures to protect data assets in the face of sophisticated adversaries are all avoidable at a cost that is pennies on the dollar, compared to the cost of repair," said Mark Bower, VP, Voltage Security.

"What's more, the U.S. Government is already far down the path of new technology standards to define the next generation of data protection technologies, so industry can once and for all get ahead of the rising breach risk problem using proven, standard and recognized approaches - a gap which has seen all manner of potentially risky solutions emerge as the market looks for silver bullets.

“The fact is, leaders in the banking, healthcare and defense sectors are already embracing the newer breed of data protection technologies and taking the attackers head on. With the new data-centric security approach to data protection, the table is turned,” he said.

“Attackers who get their hands on the data get nothing, yet the data owners continue to get value from their data assets without even flinching. Data-centric security has emerged as the leading approach to stop CISO's from losing sleep at night over fears of breach risks,” Bower added.

"More recently, with Big Data in the spotlight with all its power of insight and business value, so is the risk it brings to the table. Sensitive data at scale means big risk. Fundamentally, the concentration of sensitive data inside a Big Data tool, like Hadoop, that's optimized to analyze, search, and digest data at massive scale and velocity plays into the attackers hands if the data itself is not secure. Standards-based, data-centric security solves that difficult problem - protecting data while simultaneously liberating it for analysis in low trust environments. Data security has to be hand-in-hand with data use, storage and movement - what used to be separate matters of storage protection and transport protection with all sorts of exploitable security gaps, especially during live data handling, can now be unified at the data level, putting the control back to the business, and removing compliance barriers and attack vectors efficiently and quickly,” he explained.

Voltage Security delivered the primary technology that enabled Heartland to recover from this breach in less than 60 days. Heartland’s CEO, Bob Carr, acknowledged, “Every single breach I know of wouldn't have happened if our end-to-end encryption solution had been there.”

“We provided the technology to remediate their breached systems, their merchant systems and their merchants. We protect their data. We helped Heartland save their business,” said Bower.

Featured

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.