cybersecurity

A Look Into StorMagic’s Crystal Ball: 2022 Predictions for Edge, Video, Security and More

As another year comes to a close, the folks at StorMagic have been spending some time reflecting on the past year and contemplating what IT trends and transformations they expect to see in 2022. Here are some of the technology predictions our experts anticipate for the year ahead: Advancements to Technology: Year over year, technology continues to evolve, and 2022 [...]

Do Your Part, #BeCyberSmart: StorMagic Celebrates Cybersecurity Awareness Month 

Over the past several decades, the world has become increasingly dependent on technology. The advent of technology has brought with it several advantages, including increased accessibility to information, innovation across many different fields, time and cost efficiencies, and better communication. However, it has also opened up the door to some serious problems -- one of the most common being cyber [...]

Cybersecurity – A Beginner’s Guide

What is Cybersecurity? Cybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access, hacking, malware, and other forms of cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data confidentiality, integrity, and availability, also known as the CIA triad. They are just [...]

StorMagic Proudly Claims Gold in the 2021 Cybersecurity Excellence Awards

We are excited to announce that StorMagic was selected as a gold winner in two different categories of the 2021 Cybersecurity Excellence Awards. StorMagic KMaaS was awarded gold in the “Cybersecurity Product / Service Awards -- Data Security” category, and SvKMS in the “Cybersecurity Industry Solutions Awards -- Manufacturing” category. Each year, Cybersecurity Insiders hosts its Cybersecurity Excellence Awards program, [...]

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premises HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for an organization’s current data protection [...]

Implementing IT Systems within Pharmacies: Challenges, Requirements, and More

Everyone has made a trip to the pharmacy at some point in their lives. But have you ever stopped to think about the technologies pharmacies utilize and how much data they’re generating, sharing, and storing on a daily basis? There are many steps that go into the process of getting the right medication into the hands of the right patient, [...]

StorMagic SvSAN with Data Encryption Named Winner in 2019 Cybersecurity Excellence Awards Program

This week, StorMagic SvSAN was named a Bronze Winner in the Encryption Product Category of the 2019 Cybersecurity Excellence Awards. This program honors individuals, products and companies that demonstrate excellence, innovation and leadership in information security. The finalists and winners were selected based on the strength of their nomination, as well as the popular vote by members of the Information [...]

Is Your Edge Site a Cybersecurity Weak Point?

What do you picture when you think of cyber crime? Gangs stealing credit card details? Computer whizzes hacking organizations and stealing data? Physical cyber-security attacks are probably not the first thing that come to mind. However, we are living in a time where demand for computing power is at an all time high and there are more edge computing sites [...]

Global Trends in Data Security: Threats and the Rise of Encryption

Thales, one of the leading providers of data security solutions has recently released their annual Data Threat Report for 2018. This report analyzes data from 1,200 senior security managers from 11 countries around the globe, including the US, Germany, UK, the Netherlands, Japan, India, and Sweden and highlights among other trends, the rise of encryption. The report shows that spending [...]