Wave in the News
-
February 24, 2015
SSD Management Made Easy
As Greg Kazmierczak, the Chief Technical Officer of Wave Systems tells us, “Wave provides IT managers with a complete data protection solution for their organization’s SEDs, all from a single remote console—either on-premise or in the cloud. Wave EMBASSY® Remote Administration Server (ERAS) and Wave Cloud solutions were specifically tailored to manage superior encryption options such as SEDs fro
-
February 4, 2015
Three Adware-Infected Android Apps Suspended From Google Play
Wave Systems CTO Greg Kazmierczak comments on recent reports that three popular apps in the Google Play Android app store were infecting users with adware. Though Google is said to be scanning for potential risks, there are multiple challenges in properly identifying all potential situations. “Google has been doing a better job of scanning for malicious apps, but in all reality, it can be difficult to prove that malicious code is even in an app at all,” said Kazmierczak.
-
January 30, 2015
Don't Be Next: How to Stop the Next Hack Attack
Fresh Business Thinking, an online UK-based publication geared towards business owners, directors and entrepreneurs, recently picked up an article crafted by Wave's Boudewijn Kiljan who offers his take on how best to secure a company's assets in a modern workforce environment that is essentially borderless.
-
January 19, 2015
Bold Reform Needed to Strengthen Our Cybersecurity
In the hours leading up to President Obama’s State of the Union address, Bill Solms takes a firm stance on the state of cybersecurity in our nation. Leading off the article in a pseudo letter to the President, Bill clearly states his position, saying “Mr. President, the status quo in cybersecurity is failing this country.
-
December 18, 2014
Securing edge devices and data in distributed industrial applications
In the last few months there has been a resurgence of interest in the internet of things, suggesting that the era for building distributed big data industrial applications has at last dawned. Power companies are working hard to build the smart grid by melding IT technology with electricity services. Oil companies are integrating their machinery into digital oil fields. Photovoltaic technology is being developed as a consumer product, to integrate with the smart grid centralised solar farms, and distributed residential solar stations.
-
December 8, 2014
Cybersecurity Blind Spots: What Aspiring Experts Need to Know
As cautious as some people are about their web browsing habits, they throw that caution to the wind when it comes to managing their passwords. This was apparent in a survey of some 1,000 Internet users performed for ComputerTrainingSchools.com by Op4G.
-
November 17, 2014
U.S. State Department is Latest Hacking Victim
Over the course of the last several weeks, a number of high-profile U.S. federal networks have been breached by attackers. The latest organization to be breached is the U.S. State Department, which had to take its email system offline. The breach at the State Department follows attacks against the White House, the United States Postal Service (USPS) and the National Oceanic and Atmospheric Administration (NOAA).
-
November 14, 2014
A Modern Approach to Authentication – The Virtual Smart Card
Highlighting the ongoing challenges of CEOs and CIOs to minimize the onslaught of cyber attacks against enterprises, Girish speaks to the need to not only “support” strong authentication, but to also understand the strength and the context of the solutions, as well as the industry standards that apply. Girish offers the Wave Virtual Smart Card as a solution – pointing to its ease of use and its ability to lower total cost of ownership by upwards of 50 percent.
-
November 14, 2014
Self-Encrypting Drives
Wave's EMBASSY® Remote Administration Server was recently mentioned by name in a CSO Online article about self-encrypting drives. “SEDs are becoming more popular as businesses realize the importance of security data at rest,” states the article. It appears as though, once again, Wave was ahead of its time. According to the author, the key selling point for SEDs isn't just that they encrypt data, but that it's carried out in the firmware of the drive.
-
November 11, 2014
US Postal Service Breach Hits Staff and Customer Details
The US Postal Service (USPS) revealed its systems have been hacked and personally identifiable data related to employees and customers exposed. A spokesperson for the USPS explained that the information associated with employees “may include” names, dates of birth, Social Security numbers, addresses, employment dates, emergency contact details and more.
-
October 29, 2014
What's Causing the Recent String of Data Breaches? Micron Talks to Wave Systems' Data Security Expert to Uncover the Answer
It’s Cyber Security Awareness month, which begs the question: are we doing all we can to protect our data? In hopes of answering that question, Micron’s Jon Tanguy sat down with Girish Bhat – one of Wave’s collaborators with Micron – to talk all things encryption. In this Micron blog, Girish sheds some light on how data breaches have evolved over the last few years, and waxes poetic about the role of hardware encryption within the bigger “security package,” stressing the importance of standards and specifications to securing user data.
-
October 29, 2014
Global Security Standard to be Developed by Vendors
Following Micron’s PR announcement (Partner News: Micron Technology, Wave Systems, Lenovo and American Megatrends Inc.
-
October 29, 2014
Hackers Reportedly Breached White House Network
Wave's CTO Greg Kazmierczak chimes in on the latest high-profile attack - an unclassified White House network breach. Greg added: " Even after shutting down part of the network, there would still be an effort to track down the source of the attack. The decision to temporarily shut down the network was probably dictated by a combination of the type of attack, the remediation required and whether additional data could be lost during the remediation process."
-
October 27, 2014
Why Software Does Not Sufficiently Protect Against Targeted Attacks
Wave’s CTO EMEA talks to Funkschau about the insufficiency of software against targeted attacks, he defines APTs, points to ways the reader can provide the earliest possible protection and why hardware-based software should be preferred over software-based protection.
-
October 14, 2014
Choose Security Over Convenience for Authentication
Aware that consumer data is compromised in massive data breaches in what seems like every other week, Mr. Bradley explores what companies should expect and how they can prevent data breaches. Using Wave’s branded infographic dubbed, “Four Authentication Definitions Every IT Security Pro Should Know,” he is able to further highlight the importance of two-factor authentication, showcasing it with the graphic’s four educational panels: “Something You Know,” “Something You Have,” “Something You Are,” and “Two-Factor Authentication.”