Titaniam

Next Gen Cybersecurity Startup of the Year . Most Innovative Ransomware Data Security Solution . Hot Company Zero Trust . Best Product Encryption

Next Gen Cybersecurity Startup of the Year . Most Innovative Ransomware Data Security Solution . Hot Company Zero Trust . Best Product Encryption

Next Gen Cybersecurity Startup of the Year . Most Innovative Ransomware Data Security Solution . Hot Company Zero Trust . Best Product Encryption

Uncategorized

A New Approach to Privacy-Preserving Encryption

GUEST BLOG For years, I’d always assumed that privacy-preserving encryption was equivalent to homomorphic encryption. You will recall that with homomorphic encryption, arithmetic can be done on encrypted data to produce the same value as would emerge for addition of the cleartext. This method has received so much investment that it’s not hard to conclude that it’s required …

A New Approach to Privacy-Preserving Encryption Read More »

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch

We recently learnt that a number of our prospects were running their B2B SaaS platform on top of Elasticsearch. Nearly all of them asked if we also support AWS OpenSearch. Many of them are running older versions of Elasticsearch and are evaluating if they should upgrade to a more recent version or migrate to OpenSearch …

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch Read More »

What is an ‘Assumed Breach’ posture? How does encryption of data-in-use help?

  When unauthorized individuals extract restricted and sensitive information from protected systems, the event is known as a data breach. Such incidents incur major financial consequences on the victims. This necessitates a set of standard security measures to be taken. How can we predict such possibilities and prevent them? Let’s look at Assumed Breach and …

What is an ‘Assumed Breach’ posture? How does encryption of data-in-use help? Read More »

Why should you watch out for SOC Data: The Threat of Ransomware

With the use of data-driven insights to efficiently develop business operations, significant security risks come with the territory. Given the import of the Security Operations Center, cyber threats and attacks need to be prevented. Cybercrime and security breaches are already on the rise, and countless businesses are particularly vulnerable due to inadequate cyber security. Let’s …

Why should you watch out for SOC Data: The Threat of Ransomware Read More »

OpenSearch Partner Highlight: How Titaniam Arcus can further secure…

OpenSearch Partner Highlight: How Titaniam Plugin can further secure your OpenSearch Deployment Over the past few years there have been numerous security breaches reported in the news. These types of incidents are top of mind as people want to ensure the software and services they build are secure. OpenSearch provides an out-of-the-box security plugin so that developers …

OpenSearch Partner Highlight: How Titaniam Arcus can further secure… Read More »

Normalizing Outliers in Cybersecurity – Ransomware Edition

Normalizing Outliers in Cybersecurity – Ransomware Edition Last week, I wrote an article titled “Black Swan in Data Security”. The primary point I made is that most IT projects fail to consider even mild outlier events when it comes to security (such as compromised passwords or breach). However what used to be an outlier event, ransomware …

Normalizing Outliers in Cybersecurity – Ransomware Edition Read More »