EDGE 2015 is starting in

Find out more EDGE 2015
Menu
Snowden leaks spark encryption explosion: Unisys

Snowden leaks spark encryption explosion: Unisys

Security experts predict 2014 to be the 'year of encryption'

Security experts have predicted an explosion in the use of encryption this year following disclosures the US government may have accessed data from the internal network of internet service providers.

Unisys security experts predict the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data traffic inside enterprises is vulnerable to detection from outsiders.

“Disclosures that the U.S. government may have accessed data from the internal networks of major internet service providers have already prompted some of these companies to expand the use of encryption within their own organisations,” a company spokesperson said.

“That activity will continue to grow in 2014, resulting in an explosion in the use of encryption tools.”

Unisys chief information security officer Dave Frymier said, regardless of what you might think of Edward Snowden, the government contractor who leaked secrets about U.S. government surveillance, there was no denying that his disclosures have heightened awareness of cybersecurity all over the world.

“Before that, many enterprises were running unencrypted data on their internal networks, which they believed were secure. Now they are beginning to use encryption internally as well, so we expect 2014 to be the year of encryption.” As a result of the Snowden disclosures, officials at the highest levels of organisations around the world will increase their focus on data loss prevention, encryption and prioritising investments in security, Unisys experts predicted. Frymier said that the increased use of encryption would both enable and encourage more companies to use infrastructure-as-a-service (IaaS) cloud solutions, where previously they might have had concerns about the safety of their data in the cloud.

Read more: Physical location of data to become irrelevant in post-Snowden era: Gartner

EDGE 2015:: For all the latest on EDGE 2015 including the keynote speakers visit the EDGE mini-site now

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags Dave FrymierEdward Snowdenencryptionus governmentdisclosures

Upcoming

Slideshows

In Pictures: 7 things we hate about Twitter

In Pictures: 7 things we hate about Twitter

You probably either love Twitter for its quirkiness and brevity or see it as a pointless waste of time. After nearly a decade on the social scene, Twitter still needs to improve its user experience and fill in notable gaps in the service. These seven problems are long overdue for a fix.

In Pictures: 7 things we hate about Twitter
IN PICTURES: EDGE 2015 - Sponsor Briefing

IN PICTURES: EDGE 2015 - Sponsor Briefing

With EDGE 2015 just 17 days away, ARN and Reseller News NZ held a Sponsors Briefing where ARN publisher and president, Susan Searle, and Events Manager, Alexandra West, ran through the considerable logistics in detail. Attendees then enjoyed some splendid canapes and drinks. EDGE is designed to bring the A/NZ channel together in a collaborative and educational environment. Themed around channel channel leadership, EDGE will be held at the Sheraton Mirage, Port Douglas, July 20-23. Photos by MIKE GEE.

IN PICTURES: EDGE 2015 - Sponsor Briefing
In Pictures: Robots that cook, clean, sing and dance

In Pictures: Robots that cook, clean, sing and dance

Cooking, learning language and doing the laundry are a few of the human skills demonstrated by.real humanoid bots featured in the National Geographic movie Robots.

In Pictures: Robots that cook, clean, sing and dance

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments