Entries by Chenxi Wang

2015 Black Hat – What to Look Forward to at the Event

  Next week is the Black Hat conference again, the annual gathering of the best hackers and security professionals around the world. I will be in attendance with my CipherCloud colleagues. I am running a panel at codenomiCon, and we’ll be exhibiting our products on the show floor, at booth #766. I always enjoy going […]

Cloud Service Provider Encryption Doesn’t Solve the Problem

Salesforce just announced the general availability of Shield, their Platform Encryption function. Organizations can now use Shield to protect data stored in the Salesforce environment. Cryptography, for years, had been a discipline of only academic and military interest, an esoteric technology to many. With the advent of the web, e-commerce, and later mobility, cryptography has […]

The Top 3 Cloud Security Challenges

These days, just about every enterprise understands that the cloud is not an option but a business imperative. Cloud computing—especially turnkey public cloud computing through enterprise-grade applications like those offered by global cloud leaders Salesforce, Google, and Microsoft—can dramatically accelerate innovation and increase availability, responsiveness, and productivity across an entire organization. But with cloud computing […]

Sailing off the Map: RSA 2015

The annual RSA conference is the biggest gathering of security professionals on the planet. The 2015 conference happened last week, with over 30,000 attendees descended upon San Francisco. “We have sailed off the map, my friends,” RSA”s Amit Yoran said in his opening keynote. “Sitting here and awaiting instructions? Not an option. And neither is […]

Cloud Chat Inaugural Episode – CipherCloud chats with Michelle Dennedy

When I initially had the idea of “CloudChat”, an interview series where CipherCloud interviews thought leaders and discusses timely, engaging, and thought-provoking issues in the security industry. Michelle Dennedy was the first name came to my mind. Michelle, besides being one of the most recognized voices in consumer privacy (she is the Chief Privacy Officer […]

CISOs Talk Incident Response: Educating Your Board

This is Part 2 in a series, to read Part 1, see: CISO’s Talk Incident Response: 3 Steps to Breach Readiness. Attendees at the event agreed that the industry must shift from the prevention mindset to detect-and-response. But you can’t do that without your board’s support. One CISO said: “It’s important to ask your board […]

CISOs Talk Incident Response: 3 Steps to Breach Readiness

This is Part 1 in a series, to read Part 2, see: CISOs Talk Incident Response: Educating Your Board Recently I had a pleasure of attending a CISO networking dinner. The event drew high profile CISOs from large financial institutions, healthcare companies, retailers, education, and hospitality industries. Incident response was THE topic of the evening. […]

Digital Disruption in the Twin Cities: ServiceNow Cloud Summit

Minneapolis, MN – Despite the snow here, quite a few folks showed up for the ServiceNow cloud summit last week to explore cloud adoption trends and discuss strategies for governance and risk mitigation while moving to the cloud. The Twin Cities are home to the headquarters of many companies on the Fortune 500 list, including […]

Data Sovereignty: A layman’s guide to the Microsoft Ireland Case

If your customer is in  Amsterdam, your data center is in Ireland, you are a US-based company, and you have just been served a search warrant for data by one of these governments, should you comply? Microsoft recently had to face a similar situation when US federal prosecutors served them with a search warrant that […]

Quick Take: Obama’s Cyber Security Summit, February 13

On Feb 13, President Obama concluded a week-long Cybersecurity push with a summit at Stanford University, attended by senior government officials and top executives from private industries. The CEO of Apple, Bank of America, America Express, AIG, MasterCard, PayPal, Visa, and the president of Intel spoke at the event. The summit came at the wake […]

Let’s Discuss Zero-Knowledge Data

This is the second article in a series: you can read the first article on data security here.   In cryptography, zero-knowledge proof is a method by which one party can prove to another party that a statement is true, without revealing information about the statement. Goldwasser, Micali, and Reckoff from MIT first proposed the […]