What hackers inside your company are after: Convenience

Summary The truth is we’ve all become addicted to the amazing, modern conveniences driven mainly by advances in connected computing. Unfortunately, this pursuit of convenience has created problems in its natural opposite: security. Nearly every measure of security costs us convenience, and nearly every new convenience opens up new security concerns. Some hold that rapid […]
Tackling Private Data Exposure and Cyber Theft at Banks Using Privileged Database Access

Summary Banks rely on financial and physical supply chains, information systems, partners, and new ventures to ensure efficiency, process transactions, provide products and services, and manage risk. On the operational side, suppliers and vendors are vital to a healthy enterprise, as are data analytics, compliance, procurement and legal oversight. Finding trustworthy partners is certainly key […]
Episode 22: A Conversation with James Beecham

Summary James Beechman, co-founder of ALTR, goes in depth on the challenges of finding a common language between technical and non-technical stakeholders, the importance of top-down buy-in to delivering better practices that work, how to identify tangible benefits of DevOps, both for engineers and the broader business, above all, how to start on the right […]
Partnership Uses Blockchain Technology To Secure Fertility Data

Summary ALTR’s data-security platform enables FRTYL to store and retrieve data, as well as anonymize it so that it can be used as a trusted resource that protects the identity and authenticity of all participants involved, the companies explained. FRTYL’s centralized database brings a repository of surrogates and more than 15,000 egg donors together so […]
DSaaS Vendor Combats Cyber Security and Data Privacy Challenges

Summary ALTR DSaaS can reduce or even eliminate both remote threats to data as well as direct (or internal) threats to data. Remote access to data must flow through ALTR Smart Database Drivers, putting ALTR DSaaS in the critical path of data access. This is where the ALTR DB service comes in to play; using […]
From Banking and Data Security to Compliance

Summary Blockchain is the technology, and cryptocurrencies are an application of that technology toward a singular goal. While cryptocurrency has been on a rollercoaster ride in terms of acceptance and mainstream skepticism, blockchain is firmly established in the enterprise roadmap as an enabling technology for organizations across the industry. Its evolution from open, public ledgers […]
How to Address the Top 5 Threats to Banking Data

Summary The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to protect. For most companies, that most valuable asset is data, and banks, which have always been laboratories of innovation, are on the leading edge of data-driven enterprise. Whether customer data, information on lending activity, or assets […]
Rethinking Data Governance to Bolster Security Strategy

Summary The global pandemic unexpectedly forced many organizations to quickly adapt to remote working, accelerating the transition to a distributed workforce. This trend, coupled with the recent surge of cyberattacks carried out across business sectors, has left organizations scrambling to secure sensitive data in hybrid and multi-cloud environments. As companies continue to operate across a […]
What has the pandemic taught us about security priorities?

Summary Interviewing Doug Wick, VP of Products at ALTR, Wick goes into detail on what we learnt from the pandemic/what we should have learnt. “While we all knew that the traditional network perimeter, and the tools one uses to protect it, has been disappearing for a while, the pandemic has really shone a light on […]
Blockchain In Cybersecurity Use Case #4: ALTR

Summary At previous companies, founders of ALTR had noticed certain flaws that they strived beat in their product. With ALTR, the founders sought to bring the same infrastructure that prevents the theft of money to data security. Central to the problem around data usage and storage is one of trust. It’s not just about keeping […]