<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Certes blog</title>
    <link>https://147376311.hs-sites-eu1.com/certes-blog</link>
    <description />
    <language>en</language>
    <pubDate>Tue, 17 Mar 2026 11:38:44 GMT</pubDate>
    <dc:date>2026-03-17T11:38:44Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Critical Infrastructure Depends on Strong Encryption - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/16/critical-infrastructure-depends-on-strong-encryption</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2019/09/16/critical-infrastructure-depends-on-strong-encryption" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/CN_Critical-Infrastructure-BLOG.png" alt="Critical Infrastructure Depends on Strong Encryption - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt; 
     &lt;span style="font-size: 14pt; background-color: transparent;"&gt;Increasingly, critical infrastructure relies on internet connected industrial control systems (ICS) and internet-enabled distributed operations. Industrial control systems, such as Supervisory Control and Data Acquisition (SCADA) are central to the operation of infrastructure in electricity, transportation, oil and gas, water, manufacturer, and other critical infrastructure sectors.&lt;/span&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;And, as automation continues to evolve and become more important worldwide, the use of&amp;nbsp;ICS/SCADA systems are going to become even more frequent.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Encryption is critical to the security of the industrial control systems and the communication channels through which they send/receive sensitive data to keep critical infrastructure&amp;nbsp;functioning. It protects the integrity of data in transit, enables visibility of communications channels, and enables secure authorization to defend against compromise by malicious actors. For example, encryption is used to protect data in transit across the electricity grid, including communications to and from operations centers, power generation systems, distribution substations, and home “smart grid” networks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Because encryption is among the most important safeguards for managing the risk of data breaches, it is widely mandated by government and critical infrastructure organizations. Strong encryption is recommended by &lt;a href="https://www.nist.gov/cyberframework"&gt;NIST Framework for Improving Critical Infrastructure Cybersecurity&lt;/a&gt;, now mandatory for U.S. Government agencies. It is also directed for financial sector entities and Smart Grid operators.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Cybersecurity is critical for national and economic security,” said Secretary of Commerce Wilbur Ross (2018). “The voluntary NIST Cybersecurity Framework should be every company’s first line of defense. Adopting version 1.1 is a must for all CTO’s.”&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt;
     &lt;span style="font-size: 14pt; background-color: transparent;"&gt;Increasingly, critical infrastructure relies on internet connected industrial control systems (ICS) and internet-enabled distributed operations. Industrial control systems, such as Supervisory Control and Data Acquisition (SCADA) are central to the operation of infrastructure in electricity, transportation, oil and gas, water, manufacturer, and other critical infrastructure sectors.&lt;/span&gt;
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;And, as automation continues to evolve and become more important worldwide, the use of&amp;nbsp;ICS/SCADA systems are going to become even more frequent.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Encryption is critical to the security of the industrial control systems and the communication channels through which they send/receive sensitive data to keep critical infrastructure&amp;nbsp;functioning. It protects the integrity of data in transit, enables visibility of communications channels, and enables secure authorization to defend against compromise by malicious actors. For example, encryption is used to protect data in transit across the electricity grid, including communications to and from operations centers, power generation systems, distribution substations, and home “smart grid” networks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Because encryption is among the most important safeguards for managing the risk of data breaches, it is widely mandated by government and critical infrastructure organizations. Strong encryption is recommended by &lt;a href="https://www.nist.gov/cyberframework"&gt;NIST Framework for Improving Critical Infrastructure Cybersecurity&lt;/a&gt;, now mandatory for U.S. Government agencies. It is also directed for financial sector entities and Smart Grid operators.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Cybersecurity is critical for national and economic security,” said Secretary of Commerce Wilbur Ross (2018). “The voluntary NIST Cybersecurity Framework should be every company’s first line of defense. Adopting version 1.1 is a must for all CTO’s.”&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2019%2F09%2F16%2Fcritical-infrastructure-depends-on-strong-encryption&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:48 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/16/critical-infrastructure-depends-on-strong-encryption</guid>
      <dc:date>2026-03-12T12:09:48Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>End-to-End Data Protection - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2023/03/09/end-to-end-data-protection</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2023/03/09/end-to-end-data-protection" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/encryption-1-2.jpg" alt="End-to-End Data Protection - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Data breaches are unfortunately inevitable, and traditional network security alone is no longer enough. Organizations need to change their focus from perimeter defenses to a data-centered approach. This keeps sensitive information protected no matter where it goes.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;End-to-end encryption (E2EE) is essential for keeping data safe. It protects data before sending, while traveling, and during storage.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With rising regulatory demands and sophisticated cyber threats, businesses must act now to safeguard their most valuable asset: data.&lt;/span&gt;&lt;/p&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;h2&gt;&lt;strong&gt;What is End-to-End Encryption?&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;End-to-end encryption (E2EE) protects data from the moment someone creates it until it reaches the right person. Unlike traditional encryption methods that protect data only in certain states, E2EE keeps data encrypted all the time. This prevents unauthorized individuals from reading it.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;How End-to-End Encryption works:&lt;/span&gt;&lt;/p&gt; 
           &lt;ul&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Data is encrypted at the source before it leaves a device or system.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;It remains encrypted as it moves through networks, cloud environments, or storage systems.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Only the intended recipient with the decryption key can access and read the data.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Without the right decryption keys, stolen data is useless to cybercriminals. This is true even if they get past network security. This makes E2EE a critical defense against data breaches, ransomware attacks, and insider threats.&lt;/span&gt;&lt;/li&gt; 
           &lt;/ul&gt; 
           &lt;h2&gt;&lt;strong&gt;Why Businesses Need Data Encryption&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Data is the primary target of cybercriminals. Businesses must protect sensitive data, like financial records, customer information, and trade secrets. This includes intellectual property. Here’s why encryption is non-negotiable:&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;ol&gt; 
            &lt;li&gt;&lt;strong&gt; The Growing Threat of Cyberattacks&lt;/strong&gt;&lt;/li&gt; 
           &lt;/ol&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Cyberattacks have evolved beyond brute-force hacking. Attackers exploit stolen credentials, phishing schemes, and advanced malware to infiltrate systems undetected. Traditional security models that rely solely on firewalls and endpoint protection are no longer sufficient. Encryption ensures that even if unauthorized access occurs, the data remains unreadable and unusable.&lt;/span&gt;&lt;/p&gt; 
           &lt;ol start="2"&gt; 
            &lt;li&gt;&lt;strong&gt; Regulatory Compliance &amp;amp; Industry Standards&lt;/strong&gt;&lt;/li&gt; 
           &lt;/ol&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Governments and regulatory bodies worldwide impose strict data protection requirements. Laws including GDPR, DORA, NIS2, and HIPAA require encrypting sensitive data. This helps prevent breaches and ensures compliance. Organizations that fail to implement adequate security measures face hefty fines and damage to their reputations.&lt;/span&gt;&lt;/p&gt; 
           &lt;ol start="3"&gt; 
            &lt;li&gt;&lt;strong&gt; Protection Against Insider Threats&lt;/strong&gt;&lt;/li&gt; 
           &lt;/ol&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;While external threats dominate cybersecurity headlines, insider threats, whether intentional or accidental, pose just as much risk. Employees, contractors, or partners with access to critical systems can compromise data security. E2EE mitigates these risks by ensuring that only authorized users with the correct decryption keys can access sensitive information.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;How Certes Secures Data&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes delivers advanced encryption and security solutions designed to protect data at every stage. By implementing a Zero Trust approach and ensuring faultless encryption, Certes empowers businesses to mitigate cyber risks effectively.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h3&gt;&lt;strong&gt;Encryption at the Source&lt;/strong&gt;&lt;/h3&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes’ solutions encrypt data before it ever leaves its source device or application. This prevents unauthorized access from the outset and keeps sensitive information protected throughout its journey across networks.&lt;/span&gt;&lt;/p&gt; 
           &lt;h3&gt;&lt;strong&gt;Preventing Data Interception&lt;/strong&gt;&lt;/h3&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Traditional security measures focus on protecting the perimeter, but attackers often gain access through stolen credentials or unpatched vulnerabilities. Certes ensures that even if an intruder breaches a system, the encrypted data remains unreadable and unusable.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;Implementing Secure Data Practices&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Businesses must take a proactive approach to cybersecurity by implementing secure data protection strategies. Here are key steps organizations can take:&lt;/span&gt;&lt;/p&gt; 
           &lt;ul&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Adopt End-to-End Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Encrypt data from creation to consumption to prevent unauthorized access.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Implement Zero Trust Architecture&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Assume that no user or device is trustworthy by default, requiring continuous verification.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Regularly Rotate Encryption Keys&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Reduce the risk of key compromise by frequently updating encryption keys.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Secure Backups with Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Protect backup data to prevent ransomware attacks from rendering recovery efforts useless.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Train Employees on Cybersecurity Best Practices&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Teach staff to spot and avoid cyber threats. This will help reduce human error.&lt;/span&gt;&lt;/li&gt; 
           &lt;/ul&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;Future Trends in Encryption&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Cybersecurity threats are constantly evolving, and encryption technologies must adapt to stay ahead. Here’s what businesses should expect in the coming years:&lt;/span&gt;&lt;/p&gt; 
           &lt;ul&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Quantum-Safe Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – As quantum computing advances, traditional encryption algorithms will become obsolete. Businesses must prepare for post-quantum cryptography to ensure future-proof security.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;AI-Driven Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Artificial intelligence and machine learning will improve encryption methods. This will allow security measures to adapt to real-time threats.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Enhanced Regulatory Requirements&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Governments will continue tightening data protection laws, requiring businesses to adopt stronger encryption measures to remain compliant.&lt;/span&gt;&lt;/li&gt; 
           &lt;/ul&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;Learn More About Certes Solutions&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes offers advanced encryption solutions. These help businesses protect sensitive data, stay compliant, and defend against new cyber threats. To improve network security, consider using a Zero Trust strategy.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;If you want to protect your backups, Certes has the tools and knowledge to help. They can keep your organization safe. &lt;/span&gt;&lt;a href="https://certes.ai/demo-request/"&gt;&lt;span style="font-weight: 400;"&gt;Request a Demo to learn how Certes can help you implement end-to-end encryption for ultimate data protection&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/p&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Data breaches are unfortunately inevitable, and traditional network security alone is no longer enough. Organizations need to change their focus from perimeter defenses to a data-centered approach. This keeps sensitive information protected no matter where it goes.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;End-to-end encryption (E2EE) is essential for keeping data safe. It protects data before sending, while traveling, and during storage.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With rising regulatory demands and sophisticated cyber threats, businesses must act now to safeguard their most valuable asset: data.&lt;/span&gt;&lt;/p&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;p&gt;&lt;img class=" wp-image-33824" src="https://147376311.hs-sites-eu1.com/hs-fs/hubfs/Imported_Blog_Media/encryption-1-1.jpg?width=1013&amp;amp;height=571&amp;amp;name=encryption-1-1.jpg" alt="" width="1013" height="571"&gt;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;What is End-to-End Encryption?&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;End-to-end encryption (E2EE) protects data from the moment someone creates it until it reaches the right person. Unlike traditional encryption methods that protect data only in certain states, E2EE keeps data encrypted all the time. This prevents unauthorized individuals from reading it.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;How End-to-End Encryption works:&lt;/span&gt;&lt;/p&gt; 
           &lt;ul&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Data is encrypted at the source before it leaves a device or system.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;It remains encrypted as it moves through networks, cloud environments, or storage systems.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Only the intended recipient with the decryption key can access and read the data.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Without the right decryption keys, stolen data is useless to cybercriminals. This is true even if they get past network security. This makes E2EE a critical defense against data breaches, ransomware attacks, and insider threats.&lt;/span&gt;&lt;/li&gt; 
           &lt;/ul&gt; 
           &lt;p style="font-weight: 400;"&gt;&lt;img class="alignnone wp-image-33823" src="https://147376311.hs-sites-eu1.com/hs-fs/hubfs/Imported_Blog_Media/Screenshot-2023-03-09-at-10_31_29-1.png?width=1107&amp;amp;height=579&amp;amp;name=Screenshot-2023-03-09-at-10_31_29-1.png" alt="" width="1107" height="579"&gt;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;Why Businesses Need Data Encryption&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Data is the primary target of cybercriminals. Businesses must protect sensitive data, like financial records, customer information, and trade secrets. This includes intellectual property. Here’s why encryption is non-negotiable:&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;ol&gt; 
            &lt;li&gt;&lt;strong&gt; The Growing Threat of Cyberattacks&lt;/strong&gt;&lt;/li&gt; 
           &lt;/ol&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Cyberattacks have evolved beyond brute-force hacking. Attackers exploit stolen credentials, phishing schemes, and advanced malware to infiltrate systems undetected. Traditional security models that rely solely on firewalls and endpoint protection are no longer sufficient. Encryption ensures that even if unauthorized access occurs, the data remains unreadable and unusable.&lt;/span&gt;&lt;/p&gt; 
           &lt;ol start="2"&gt; 
            &lt;li&gt;&lt;strong&gt; Regulatory Compliance &amp;amp; Industry Standards&lt;/strong&gt;&lt;/li&gt; 
           &lt;/ol&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Governments and regulatory bodies worldwide impose strict data protection requirements. Laws including GDPR, DORA, NIS2, and HIPAA require encrypting sensitive data. This helps prevent breaches and ensures compliance. Organizations that fail to implement adequate security measures face hefty fines and damage to their reputations.&lt;/span&gt;&lt;/p&gt; 
           &lt;ol start="3"&gt; 
            &lt;li&gt;&lt;strong&gt; Protection Against Insider Threats&lt;/strong&gt;&lt;/li&gt; 
           &lt;/ol&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;While external threats dominate cybersecurity headlines, insider threats, whether intentional or accidental, pose just as much risk. Employees, contractors, or partners with access to critical systems can compromise data security. E2EE mitigates these risks by ensuring that only authorized users with the correct decryption keys can access sensitive information.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;How Certes Secures Data&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes delivers advanced encryption and security solutions designed to protect data at every stage. By implementing a Zero Trust approach and ensuring faultless encryption, Certes empowers businesses to mitigate cyber risks effectively.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h3&gt;&lt;strong&gt;Encryption at the Source&lt;/strong&gt;&lt;/h3&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes’ solutions encrypt data before it ever leaves its source device or application. This prevents unauthorized access from the outset and keeps sensitive information protected throughout its journey across networks.&lt;/span&gt;&lt;/p&gt; 
           &lt;h3&gt;&lt;strong&gt;Preventing Data Interception&lt;/strong&gt;&lt;/h3&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Traditional security measures focus on protecting the perimeter, but attackers often gain access through stolen credentials or unpatched vulnerabilities. Certes ensures that even if an intruder breaches a system, the encrypted data remains unreadable and unusable.&lt;/span&gt;&lt;/p&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;Implementing Secure Data Practices&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Businesses must take a proactive approach to cybersecurity by implementing secure data protection strategies. Here are key steps organizations can take:&lt;/span&gt;&lt;/p&gt; 
           &lt;ul&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Adopt End-to-End Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Encrypt data from creation to consumption to prevent unauthorized access.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Implement Zero Trust Architecture&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Assume that no user or device is trustworthy by default, requiring continuous verification.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Regularly Rotate Encryption Keys&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Reduce the risk of key compromise by frequently updating encryption keys.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Secure Backups with Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Protect backup data to prevent ransomware attacks from rendering recovery efforts useless.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Train Employees on Cybersecurity Best Practices&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Teach staff to spot and avoid cyber threats. This will help reduce human error.&lt;/span&gt;&lt;/li&gt; 
           &lt;/ul&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;Future Trends in Encryption&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Cybersecurity threats are constantly evolving, and encryption technologies must adapt to stay ahead. Here’s what businesses should expect in the coming years:&lt;/span&gt;&lt;/p&gt; 
           &lt;ul&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Quantum-Safe Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – As quantum computing advances, traditional encryption algorithms will become obsolete. Businesses must prepare for post-quantum cryptography to ensure future-proof security.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;AI-Driven Encryption&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Artificial intelligence and machine learning will improve encryption methods. This will allow security measures to adapt to real-time threats.&lt;/span&gt;&lt;/li&gt; 
            &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Enhanced Regulatory Requirements&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; – Governments will continue tightening data protection laws, requiring businesses to adopt stronger encryption measures to remain compliant.&lt;/span&gt;&lt;/li&gt; 
           &lt;/ul&gt; 
           &lt;p style="font-weight: 400;"&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;h2&gt;&lt;strong&gt;Learn More About Certes Solutions&lt;/strong&gt;&lt;/h2&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes offers advanced encryption solutions. These help businesses protect sensitive data, stay compliant, and defend against new cyber threats. To improve network security, consider using a Zero Trust strategy.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-weight: 400;"&gt;If you want to protect your backups, Certes has the tools and knowledge to help. They can keep your organization safe. &lt;/span&gt;&lt;a href="https://certes.ai/demo-request/"&gt;&lt;span style="font-weight: 400;"&gt;Request a Demo to learn how Certes can help you implement end-to-end encryption for ultimate data protection&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/p&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2023%2F03%2F09%2Fend-to-end-data-protection&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:48 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2023/03/09/end-to-end-data-protection</guid>
      <dc:date>2026-03-12T12:09:48Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Introducing Certes Networks Provable Security™ - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2020/02/02/introducing-certes-networks-provable-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2020/02/02/introducing-certes-networks-provable-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/data-security-for-hotels-2-1.jpg" alt="Introducing Certes Networks Provable Security™ - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Introducing Certes Networks Provable Security – &lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style="font-size: 14pt;"&gt;A New Way to Measure the Effectiveness of Your Security Strategy&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;&lt;strong&gt;February 3, 2020 – &lt;/strong&gt;Traditional network and data security approaches have focused primarily on threat detection and vulnerability management. Demonstrating business value, such as compliance, risk management, or information security, has been challenging. Consequently, data security is more often looked upon as a necessary cost of doing business. However, as CIOs, CISOs and network security teams become more fully vested members of the C-suite, provable security remains an ever-growing and overarching goal when considering employing data security technology. Organizations want to see data assurance as a strategic investment in mitigating risk and as a quantifiable contribution to the overall value of their business.&lt;/p&gt; 
           &lt;p class="p2"&gt;&lt;span class="s2"&gt;Certes Networks Provable Security™ &lt;/span&gt;enables exactly that based on the Certes Five Pillars for Provable Security, or key performance indicators, that enable organizations to quantify security’s role to build, modify and measure a data security strategy that aligns and protects the needs of the organization while mitigating risk.&lt;/p&gt; 
           &lt;p class="p2"&gt;Certes Networks Provable Security™ is built on the &lt;span class="s2"&gt;Certes Five Pillars&lt;/span&gt;:&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar One: &lt;strong&gt;Policy Enforcement &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Two: &lt;strong&gt;Crypto-segmentation &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Three: &lt;strong&gt;Scalability &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Four: &lt;strong&gt;Visibility &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Five: &lt;strong&gt;Observability &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Certes Networks Provable Security™ starts with the premise that policy enforcement is only as good as the policy defined and how that policy is enforced. While threats and vulnerabilities are virtually infinite, access to data is defined and is therefore finite and measurable. By enabling policy definition and enforcement at a highly granular level, risk can be eliminated and data security can be quantified, measured and outcomes driven.&lt;/p&gt; 
           &lt;p class="p2"&gt;Certes Pillar Two, Crypto-Segmentation creates a reduced scope of trust per policy, protected by encryption, to separate your applications and workloads.&lt;/p&gt; 
           &lt;p class="p2"&gt;Sean Everson, Chief Technology Officer, Certes Networks, comments: “Crypto-Segmentation removes the implicit trust we traditionally place in our network infrastructure by creating reduced scopes of trust to securely separate data flows between applications and workloads as defined by fine-grained policies, independent of the physical infrastructure or underlying network topology.”&lt;/p&gt; 
           &lt;p class="p2"&gt;The next pillar of Provable Security is Scalability. Certes Layer 4 solution is a scalable end-to-end encryption management solution that is network agnostic easily integrating into any existing network infrastructure, fully interoperable with the existing security stack and with zero impact to performance. Certes offers the ability to support multiple deployments across multi-vendor environments on any network or transport. With Certes Layer 4 technology, a customer can be sure that their data assurance posture will scale to support the depth and breadth of a customer’s environment, whether deployed top-of-rack, in a virtual environment, between data centers and applications (east to west) or simply just across the WAN or SD-WAN.&lt;/p&gt; 
           &lt;p class="p2"&gt;The Fourth Pillar of Certes Network Provable Security™ is Visibility. The Certes Layer 4 solution encrypts data in transit, allowing for secure encryption of only the payload enabling transparent deployment that operates independently of applications and the underlying network with zero changes to routers, switches and firewalls. Network visibility and operational functionality are thereby fully maintained with zero impact to performance.&lt;/p&gt; 
           &lt;p class="p2"&gt;The last Pillar is Observability, the lynchpin that provides real-time contextual meta-data enabling rapid detection of out-of-policy data and fast response remediation to any non-compliant traffic flow or policy change to maintain the required security posture on a continuous basis. Observability provides evidential and visual proof that an organization’s security strategy is effective.&lt;/p&gt; 
           &lt;p class="p2"&gt;Paul German, CEO, Certes Networks, concludes: “Organizations need to start thinking differently about data security. The major challenges for a CISO is no longer the network rather the data has to come first. With the launch of Certes Networks Provable Security™, we have a technology solution available today that allows CIOs and CISOs to visualize and understand their data, associated applications, workloads and behavior, with real-time contextual data. Organizations can now take actionable steps not only to measure the effectiveness of their security strategy but to gain deep insight into how to enhance their security posture and to manage and enforce policies.”&lt;/p&gt; 
           &lt;p class="p2"&gt;&lt;strong&gt;About Certes Networks &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Headquartered in the U.S. with a global presence in Europe, Middle east and Asia Pacific, Certes Networks has been delivering data security technology solutions to enterprises and governments around the world for over 15 years. Our technology is deployed across 1000&lt;/p&gt; 
           &lt;p class="p2"&gt;customers in nearly 100 countries and is certified for FIPS 140-2 and Common Criteria EAL4+. Our global footprint of organizations using Certes technology has helped customers to meet national, international and industry-specific regulations.&lt;/p&gt; 
           &lt;p class="p2"&gt;To learn more about Certes Networks Provable Security™, please visit CertesNetworks.com&lt;/p&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;img class="wp-image-33209 alignleft" src="https://147376311.hs-sites-eu1.com/hs-fs/hubfs/Imported_Blog_Media/Screen-Shot-2020-01-29-at-4_36_19-PM-300x117-1.png?width=369&amp;amp;height=144&amp;amp;name=Screen-Shot-2020-01-29-at-4_36_19-PM-300x117-1.png" alt="" width="369" height="144"&gt;&lt;/p&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Introducing Certes Networks Provable Security – &lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style="font-size: 14pt;"&gt;A New Way to Measure the Effectiveness of Your Security Strategy&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;&lt;strong&gt;February 3, 2020 – &lt;/strong&gt;Traditional network and data security approaches have focused primarily on threat detection and vulnerability management. Demonstrating business value, such as compliance, risk management, or information security, has been challenging. Consequently, data security is more often looked upon as a necessary cost of doing business. However, as CIOs, CISOs and network security teams become more fully vested members of the C-suite, provable security remains an ever-growing and overarching goal when considering employing data security technology. Organizations want to see data assurance as a strategic investment in mitigating risk and as a quantifiable contribution to the overall value of their business.&lt;/p&gt; 
           &lt;p class="p2"&gt;&lt;span class="s2"&gt;Certes Networks Provable Security™ &lt;/span&gt;enables exactly that based on the Certes Five Pillars for Provable Security, or key performance indicators, that enable organizations to quantify security’s role to build, modify and measure a data security strategy that aligns and protects the needs of the organization while mitigating risk.&lt;/p&gt; 
           &lt;p class="p2"&gt;Certes Networks Provable Security™ is built on the &lt;span class="s2"&gt;Certes Five Pillars&lt;/span&gt;:&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar One: &lt;strong&gt;Policy Enforcement &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Two: &lt;strong&gt;Crypto-segmentation &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Three: &lt;strong&gt;Scalability &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Four: &lt;strong&gt;Visibility &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Pillar Five: &lt;strong&gt;Observability &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Certes Networks Provable Security™ starts with the premise that policy enforcement is only as good as the policy defined and how that policy is enforced. While threats and vulnerabilities are virtually infinite, access to data is defined and is therefore finite and measurable. By enabling policy definition and enforcement at a highly granular level, risk can be eliminated and data security can be quantified, measured and outcomes driven.&lt;/p&gt; 
           &lt;p class="p2"&gt;Certes Pillar Two, Crypto-Segmentation creates a reduced scope of trust per policy, protected by encryption, to separate your applications and workloads.&lt;/p&gt; 
           &lt;p class="p2"&gt;Sean Everson, Chief Technology Officer, Certes Networks, comments: “Crypto-Segmentation removes the implicit trust we traditionally place in our network infrastructure by creating reduced scopes of trust to securely separate data flows between applications and workloads as defined by fine-grained policies, independent of the physical infrastructure or underlying network topology.”&lt;/p&gt; 
           &lt;p class="p2"&gt;The next pillar of Provable Security is Scalability. Certes Layer 4 solution is a scalable end-to-end encryption management solution that is network agnostic easily integrating into any existing network infrastructure, fully interoperable with the existing security stack and with zero impact to performance. Certes offers the ability to support multiple deployments across multi-vendor environments on any network or transport. With Certes Layer 4 technology, a customer can be sure that their data assurance posture will scale to support the depth and breadth of a customer’s environment, whether deployed top-of-rack, in a virtual environment, between data centers and applications (east to west) or simply just across the WAN or SD-WAN.&lt;/p&gt; 
           &lt;p class="p2"&gt;The Fourth Pillar of Certes Network Provable Security™ is Visibility. The Certes Layer 4 solution encrypts data in transit, allowing for secure encryption of only the payload enabling transparent deployment that operates independently of applications and the underlying network with zero changes to routers, switches and firewalls. Network visibility and operational functionality are thereby fully maintained with zero impact to performance.&lt;/p&gt; 
           &lt;p class="p2"&gt;The last Pillar is Observability, the lynchpin that provides real-time contextual meta-data enabling rapid detection of out-of-policy data and fast response remediation to any non-compliant traffic flow or policy change to maintain the required security posture on a continuous basis. Observability provides evidential and visual proof that an organization’s security strategy is effective.&lt;/p&gt; 
           &lt;p class="p2"&gt;Paul German, CEO, Certes Networks, concludes: “Organizations need to start thinking differently about data security. The major challenges for a CISO is no longer the network rather the data has to come first. With the launch of Certes Networks Provable Security™, we have a technology solution available today that allows CIOs and CISOs to visualize and understand their data, associated applications, workloads and behavior, with real-time contextual data. Organizations can now take actionable steps not only to measure the effectiveness of their security strategy but to gain deep insight into how to enhance their security posture and to manage and enforce policies.”&lt;/p&gt; 
           &lt;p class="p2"&gt;&lt;strong&gt;About Certes Networks &lt;/strong&gt;&lt;/p&gt; 
           &lt;p class="p2"&gt;Headquartered in the U.S. with a global presence in Europe, Middle east and Asia Pacific, Certes Networks has been delivering data security technology solutions to enterprises and governments around the world for over 15 years. Our technology is deployed across 1000&lt;/p&gt; 
           &lt;p class="p2"&gt;customers in nearly 100 countries and is certified for FIPS 140-2 and Common Criteria EAL4+. Our global footprint of organizations using Certes technology has helped customers to meet national, international and industry-specific regulations.&lt;/p&gt; 
           &lt;p class="p2"&gt;To learn more about Certes Networks Provable Security™, please visit CertesNetworks.com&lt;/p&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2020%2F02%2F02%2Fintroducing-certes-networks-provable-security&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:47 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2020/02/02/introducing-certes-networks-provable-security</guid>
      <dc:date>2026-03-12T12:09:47Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>The New NYDFS Standard: Prove Your Data Is Secure, or Face Penalties</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2025/11/24/the-new-nydfs-standard</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2025/11/24/the-new-nydfs-standard" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/Blog-images-Data-poisoning-13.jpg" alt="The New NYDFS Standard: Prove Your Data Is Secure, or Face Penalties" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt; 
     &lt;span style="background-color: transparent;"&gt;For years, financial institutions treated NYDFS compliance as a documentation exercise. Policies were written, controls were described, and annual certifications were submitted.&lt;/span&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;That era is over.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The New York Department of Financial Services (NYDFS) now expects firms to prove how they protect Nonpublic Information (NPI) across every system, cloud, and third-party connection. And regulators have shown they will pursue large penalties when firms cannot demonstrate that protection in practice.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This shift has caught many organizations off-guard. They invested in detection tools, audits, and dashboards, but far fewer invested in controls that actually secure data wherever it moves.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This blog breaks down why NYDFS has raised expectations, where organizations are failing, and why data-centric protection is now the control regulators look for.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;NYDFS Is No Longer About “Reasonable Security”, It’s About Evidence&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS supervisors have repeatedly stated that certification alone is no longer enough. Firms must be able to &lt;/span&gt;&lt;strong&gt;show how NPI is segmented, encrypted, and controlled&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; across hybrid and multi-cloud networks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Recent enforcement actions underline this change:&lt;/span&gt;&lt;/p&gt; 
       &lt;h3&gt;&lt;a href="https://www.dfs.ny.gov/system/files/documents/2022/10/ea20221018_eyemed.pdf"&gt;&lt;strong&gt;EyeMed Vision Care — $4.5M penalty&lt;/strong&gt;&lt;/a&gt;&lt;/h3&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS found the organization failed to maintain effective access controls and left known security gaps unresolved. Sensitive customer data was exposed, and the regulator concluded the firm lacked proper oversight of systems handling NPI.&lt;/span&gt;&lt;/p&gt; 
       &lt;h3&gt;&lt;a href="https://www.dfs.ny.gov/reports_and_publications/press_releases/pr202311281"&gt;&lt;strong&gt;First American — $1M penalty&lt;/strong&gt;&lt;/a&gt;&lt;/h3&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;A vulnerability exposed hundreds of millions of documents containing personal and financial information. NYDFS determined the company had known about the issue for years yet did not remediate it or maintain adequate processes to protect NPI.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Both cases share a theme: &lt;/span&gt;&lt;strong&gt;NYDFS now investigates whether firms can prove their controls work, not whether they just exist on paper.&lt;/strong&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why NYDFS-Regulated Firms Are Struggling&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Most institutions can &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;see&lt;/span&gt;&lt;/i&gt;&lt;span style="font-weight: 400;"&gt; their risk. They have dashboards, scanners, reports, and audits. But very few can &lt;/span&gt;&lt;strong&gt;control&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; that risk across the places regulators now examine:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Multi-cloud estates (AWS, Azure, Google Cloud, private cloud)&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;A mix of modern and legacy applications&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Third-party service providers and integrations&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Data flows crossing internal and external boundaries&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In practice, this results in:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Inconsistent protection across different clouds&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Poor visibility of how NPI moves between systems&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Over-reliance on cloud-native encryption, where &lt;/span&gt;&lt;strong&gt;the provider holds the keys&lt;/strong&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;No way to demonstrate segmentation of sensitive data flows&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Weak evidence when regulators ask: &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;“Show us how this data is safeguarded.”&lt;/span&gt;&lt;/i&gt;&amp;nbsp;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS expects consistent protection across every environment where NPI travels, and many organizations simply don’t have a control that can meet that expectation.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why the Shift to Data-Centric Protection Matters for NYDFS&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The most common gap discovered during NYDFS enforcement is &lt;/span&gt;&lt;a href="https://certes.ai/2024/10/07/protecting-data-in-transit/"&gt;&lt;strong&gt;data in transit&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Many firms assume the network, the cloud provider, or TLS alone will cover them. Regulators no longer accept that. They expect organizations to enforce protection at the &lt;/span&gt;&lt;strong&gt;data-flow level&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;, not at the perimeter or the device.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;A modern NYDFS-aligned approach requires:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Protecting the data itself, not just the network it travels across&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Ensuring encryption cannot be bypassed or weakened by misconfigurations&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Owning the encryption keys rather than leaving them with AWS, Azure, or Google&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Being able to prove which users, systems, or services can access specific data flows&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This is the shift regulators want to see, and the shift most infrastructures were never designed for.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;How Certes DPRM Helps Organizations Meet NYDFS Expectations&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM (Data Protection &amp;amp; Risk Mitigation) &lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;gives financial institutions a single, consistent control they can point to when regulators ask how NPI is secured across their entire environment.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Instead of relying on a mix of cloud-native settings, network rules, and device-level protections, DPRM applies protection directly to each data flow. It keeps those flows isolated, authenticated, and encrypted, whether they move through private cloud, AWS, Azure, Google Cloud, or third-party networks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Your organization maintains full ownership of encryption keys and policy enforcement, removing the dependency on cloud provider key management. And because DPRM records clear, auditable policies and logs, teams can show regulators exactly how NPI is segmented, governed, and protected.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DPRM is also built for crypto agility. &lt;/span&gt;&lt;a href="https://certes.ai/2025/05/16/quantum-threats-are-here/"&gt;&lt;span style="font-weight: 400;"&gt;Its quantum-safe design means firms can be ready for the PQC era,&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; avoiding another costly and disruptive compliance cycle.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;NYDFS Has Raised the Bar, Firms Need Controls That Can Keep Up&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS is now focused on proof, not promises. If an organization can’t show how NPI is secured across end-to-end data flows, regulators see that as a material gap, no matter how strong the documentation looks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/"&gt;&lt;span style="font-weight: 400;"&gt;Certes&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; helps financial institutions replace partial coverage with data protection that works across every cloud, system, and connection. Instead of depending on the network or the provider, DPRM gives teams a straightforward, defensible answer when regulators ask how data is actually protected.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/contact/"&gt;&lt;span style="font-weight: 400;"&gt;Book your free NYDFS Readiness Briefing&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; and get a clear path to provable protection.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
      &lt;/div&gt; 
      &lt;div class="col-md-12 plr-no padding-top-60"&gt; 
       &lt;div class="post-footer"&gt; 
        &lt;div class="post-tags"&gt; 
         &lt;ul class="list-unstyled"&gt; 
          &lt;li&gt;&lt;i class="fa fa-tags"&gt; &lt;/i&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/dataprivacy/"&gt; dataprivacy &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/nydfs/"&gt; NYDFS &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/protection/"&gt; protection &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/quantum/"&gt; Quantum &lt;/a&gt;&lt;/li&gt; 
         &lt;/ul&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt;
     &lt;span style="background-color: transparent;"&gt;For years, financial institutions treated NYDFS compliance as a documentation exercise. Policies were written, controls were described, and annual certifications were submitted.&lt;/span&gt;
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;That era is over.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The New York Department of Financial Services (NYDFS) now expects firms to prove how they protect Nonpublic Information (NPI) across every system, cloud, and third-party connection. And regulators have shown they will pursue large penalties when firms cannot demonstrate that protection in practice.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This shift has caught many organizations off-guard. They invested in detection tools, audits, and dashboards, but far fewer invested in controls that actually secure data wherever it moves.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This blog breaks down why NYDFS has raised expectations, where organizations are failing, and why data-centric protection is now the control regulators look for.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;NYDFS Is No Longer About “Reasonable Security”, It’s About Evidence&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS supervisors have repeatedly stated that certification alone is no longer enough. Firms must be able to &lt;/span&gt;&lt;strong&gt;show how NPI is segmented, encrypted, and controlled&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; across hybrid and multi-cloud networks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Recent enforcement actions underline this change:&lt;/span&gt;&lt;/p&gt; 
       &lt;h3&gt;&lt;a href="https://www.dfs.ny.gov/system/files/documents/2022/10/ea20221018_eyemed.pdf"&gt;&lt;strong&gt;EyeMed Vision Care — $4.5M penalty&lt;/strong&gt;&lt;/a&gt;&lt;/h3&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS found the organization failed to maintain effective access controls and left known security gaps unresolved. Sensitive customer data was exposed, and the regulator concluded the firm lacked proper oversight of systems handling NPI.&lt;/span&gt;&lt;/p&gt; 
       &lt;h3&gt;&lt;a href="https://www.dfs.ny.gov/reports_and_publications/press_releases/pr202311281"&gt;&lt;strong&gt;First American — $1M penalty&lt;/strong&gt;&lt;/a&gt;&lt;/h3&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;A vulnerability exposed hundreds of millions of documents containing personal and financial information. NYDFS determined the company had known about the issue for years yet did not remediate it or maintain adequate processes to protect NPI.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Both cases share a theme: &lt;/span&gt;&lt;strong&gt;NYDFS now investigates whether firms can prove their controls work, not whether they just exist on paper.&lt;/strong&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why NYDFS-Regulated Firms Are Struggling&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Most institutions can &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;see&lt;/span&gt;&lt;/i&gt;&lt;span style="font-weight: 400;"&gt; their risk. They have dashboards, scanners, reports, and audits. But very few can &lt;/span&gt;&lt;strong&gt;control&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; that risk across the places regulators now examine:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Multi-cloud estates (AWS, Azure, Google Cloud, private cloud)&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;A mix of modern and legacy applications&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Third-party service providers and integrations&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Data flows crossing internal and external boundaries&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In practice, this results in:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Inconsistent protection across different clouds&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Poor visibility of how NPI moves between systems&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Over-reliance on cloud-native encryption, where &lt;/span&gt;&lt;strong&gt;the provider holds the keys&lt;/strong&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;No way to demonstrate segmentation of sensitive data flows&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Weak evidence when regulators ask: &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;“Show us how this data is safeguarded.”&lt;/span&gt;&lt;/i&gt;&amp;nbsp;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS expects consistent protection across every environment where NPI travels, and many organizations simply don’t have a control that can meet that expectation.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why the Shift to Data-Centric Protection Matters for NYDFS&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The most common gap discovered during NYDFS enforcement is &lt;/span&gt;&lt;a href="https://certes.ai/2024/10/07/protecting-data-in-transit/"&gt;&lt;strong&gt;data in transit&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Many firms assume the network, the cloud provider, or TLS alone will cover them. Regulators no longer accept that. They expect organizations to enforce protection at the &lt;/span&gt;&lt;strong&gt;data-flow level&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;, not at the perimeter or the device.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;A modern NYDFS-aligned approach requires:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Protecting the data itself, not just the network it travels across&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Ensuring encryption cannot be bypassed or weakened by misconfigurations&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Owning the encryption keys rather than leaving them with AWS, Azure, or Google&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Being able to prove which users, systems, or services can access specific data flows&lt;/span&gt;&amp;nbsp;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This is the shift regulators want to see, and the shift most infrastructures were never designed for.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;How Certes DPRM Helps Organizations Meet NYDFS Expectations&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM (Data Protection &amp;amp; Risk Mitigation) &lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;gives financial institutions a single, consistent control they can point to when regulators ask how NPI is secured across their entire environment.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Instead of relying on a mix of cloud-native settings, network rules, and device-level protections, DPRM applies protection directly to each data flow. It keeps those flows isolated, authenticated, and encrypted, whether they move through private cloud, AWS, Azure, Google Cloud, or third-party networks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Your organization maintains full ownership of encryption keys and policy enforcement, removing the dependency on cloud provider key management. And because DPRM records clear, auditable policies and logs, teams can show regulators exactly how NPI is segmented, governed, and protected.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DPRM is also built for crypto agility. &lt;/span&gt;&lt;a href="https://certes.ai/2025/05/16/quantum-threats-are-here/"&gt;&lt;span style="font-weight: 400;"&gt;Its quantum-safe design means firms can be ready for the PQC era,&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; avoiding another costly and disruptive compliance cycle.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;NYDFS Has Raised the Bar, Firms Need Controls That Can Keep Up&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;NYDFS is now focused on proof, not promises. If an organization can’t show how NPI is secured across end-to-end data flows, regulators see that as a material gap, no matter how strong the documentation looks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/"&gt;&lt;span style="font-weight: 400;"&gt;Certes&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; helps financial institutions replace partial coverage with data protection that works across every cloud, system, and connection. Instead of depending on the network or the provider, DPRM gives teams a straightforward, defensible answer when regulators ask how data is actually protected.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/contact/"&gt;&lt;span style="font-weight: 400;"&gt;Book your free NYDFS Readiness Briefing&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; and get a clear path to provable protection.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
      &lt;/div&gt; 
      &lt;div class="col-md-12 plr-no padding-top-60"&gt; 
       &lt;div class="post-footer"&gt; 
        &lt;div class="post-tags"&gt; 
         &lt;ul class="list-unstyled"&gt; 
          &lt;li&gt;&lt;i class="fa fa-tags"&gt; &lt;/i&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/dataprivacy/"&gt; dataprivacy &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/nydfs/"&gt; NYDFS &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/protection/"&gt; protection &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/quantum/"&gt; Quantum &lt;/a&gt;&lt;/li&gt; 
         &lt;/ul&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2025%2F11%2F24%2Fthe-new-nydfs-standard&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:47 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2025/11/24/the-new-nydfs-standard</guid>
      <dc:date>2026-03-12T12:09:47Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>SD-WAN Paves the Way for SD-branch - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2019/11/14/sd-wan-paves-the-way-for-sd-branch</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2019/11/14/sd-wan-paves-the-way-for-sd-branch" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/CN-SD-WAN-1024x643.jpg" alt="SD-WAN Paves the Way for SD-branch - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Software-defined wide area network (SD-WAN) is technology for configuring and implementing an enterprise WAN – based on software-defined networking (SDN) – to effectively route traffic to remote locations such as branch offices.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As SD-WAN matures, enterprises are moving away from traditional branch routers to offer consolidated network functionality on a single device.&amp;nbsp; The reason is organizations are migrating toward integrated SD-WAN alternatives, with bandwidth prioritization and centralized management capabilities for remote WAN sites.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Hardware improvements have also enabled software-based routing driving better performance of standard server platforms.&amp;nbsp; Software-based routing provides advantages in terms of its flexibility, as it can be implemented anywhere and combined with other WAN functions for a complete package.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;SD-WAN services have matured significantly over the last few years with suppliers now offering a broad range of network functionality integrated in their SD-WAN devices, including WAN optimization, routing and basic security.&amp;nbsp; But the branch network of the future will have most of the following requirements, regardless of whether they take the form of an appliance or software:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Secure WAN communications&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Reliability&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Zero-touch deployment&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Remote manageability&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Elastic scale-up and scale-down capacity&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Integration with SD-WAN, security, LAN and WiFi&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As many industries and organizations investigate and phase-out their existing branch routers in favor of SD-WAN packages, some will keep their installed routers for existing MPLS connections as part of a multiyear contract.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Options for enterprises when it comes to branch routers will now include keeping their traditional branch routers, phasing out their brand routers with SD-WAN technology or plan migration to a software-defined branch.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As SD-WAN paves the way for the SD-branch, application security and performance at the branch must be reliable and fast, with low latency.&amp;nbsp; And, IT teams are rearchitecting their branch networks to deliver on application performance expectations and data security.&amp;nbsp; So, as SD-WAN gains steam, it will be important to offer SD-WAN organizations a full-scale security management solution that allows operations to more easily roll out security services while also easing the management of monitoring, metrics, analytics and visibility of their network traffic.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Software-defined wide area network (SD-WAN) is technology for configuring and implementing an enterprise WAN – based on software-defined networking (SDN) – to effectively route traffic to remote locations such as branch offices.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As SD-WAN matures, enterprises are moving away from traditional branch routers to offer consolidated network functionality on a single device.&amp;nbsp; The reason is organizations are migrating toward integrated SD-WAN alternatives, with bandwidth prioritization and centralized management capabilities for remote WAN sites.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Hardware improvements have also enabled software-based routing driving better performance of standard server platforms.&amp;nbsp; Software-based routing provides advantages in terms of its flexibility, as it can be implemented anywhere and combined with other WAN functions for a complete package.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;SD-WAN services have matured significantly over the last few years with suppliers now offering a broad range of network functionality integrated in their SD-WAN devices, including WAN optimization, routing and basic security.&amp;nbsp; But the branch network of the future will have most of the following requirements, regardless of whether they take the form of an appliance or software:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Secure WAN communications&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Reliability&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Zero-touch deployment&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Remote manageability&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Elastic scale-up and scale-down capacity&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;span style="font-size: 14pt;"&gt;Integration with SD-WAN, security, LAN and WiFi&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As many industries and organizations investigate and phase-out their existing branch routers in favor of SD-WAN packages, some will keep their installed routers for existing MPLS connections as part of a multiyear contract.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Options for enterprises when it comes to branch routers will now include keeping their traditional branch routers, phasing out their brand routers with SD-WAN technology or plan migration to a software-defined branch.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As SD-WAN paves the way for the SD-branch, application security and performance at the branch must be reliable and fast, with low latency.&amp;nbsp; And, IT teams are rearchitecting their branch networks to deliver on application performance expectations and data security.&amp;nbsp; So, as SD-WAN gains steam, it will be important to offer SD-WAN organizations a full-scale security management solution that allows operations to more easily roll out security services while also easing the management of monitoring, metrics, analytics and visibility of their network traffic.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2019%2F11%2F14%2Fsd-wan-paves-the-way-for-sd-branch&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:46 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2019/11/14/sd-wan-paves-the-way-for-sd-branch</guid>
      <dc:date>2026-03-12T12:09:46Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Monthly Insights on Ransomware Trends and Statistics - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2024/08/13/monthly-insights-on-ransomware-trends-and-statistics-2</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2024/08/13/monthly-insights-on-ransomware-trends-and-statistics-2" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/7-1.png" alt="Monthly Insights on Ransomware Trends and Statistics - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Ransomware attacks have rapidly become one of organisations’ most serious threats. As cybercriminals become more sophisticated, the frequency and severity of ransomware attacks have escalated, placing businesses of all sizes at significant risk.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Our latest infographic,&amp;nbsp; “&lt;strong&gt;Cyber Insights on Ransomware”&lt;/strong&gt; infographic sheds light on the current landscape of ransomware threats in Q2, offering valuable data on the scope and impact of these attacks.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p style="text-align: center;"&gt;&lt;span style="font-size: 8pt;"&gt;&lt;span style="font-weight: 400;"&gt;Source: &lt;/span&gt;&lt;a href="https://www.cyberrescue.co.uk/"&gt;&lt;span style="font-weight: 400;"&gt;https://www.cyberrescue.co.uk/&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The insights presented highlight the urgent need for proactive cybersecurity measures to combat the increasing ransomware threat as the numbers continue to grow. As cybercriminals evolve and expand their reach, businesses must stay informed and prepared.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Keep an eye on our blog for these regular reports, and speak to our team today to learn how we can protect your business from ransomware and other cyber threats. Stay informed, stay secure, and stay ahead of cyber threats with &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Ransomware attacks have rapidly become one of organisations’ most serious threats. As cybercriminals become more sophisticated, the frequency and severity of ransomware attacks have escalated, placing businesses of all sizes at significant risk.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Our latest infographic,&amp;nbsp; “&lt;strong&gt;Cyber Insights on Ransomware”&lt;/strong&gt; infographic sheds light on the current landscape of ransomware threats in Q2, offering valuable data on the scope and impact of these attacks.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;&lt;img class="alignnone wp-image-34450 size-full" src="https://147376311.hs-sites-eu1.com/hs-fs/hubfs/Imported_Blog_Media/Cyber-Insights-Infographic-1.png?width=1200&amp;amp;height=5597&amp;amp;name=Cyber-Insights-Infographic-1.png" alt="" width="1200" height="5597"&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p style="text-align: center;"&gt;&lt;span style="font-size: 8pt;"&gt;&lt;span style="font-weight: 400;"&gt;Source: &lt;/span&gt;&lt;a href="https://www.cyberrescue.co.uk/"&gt;&lt;span style="font-weight: 400;"&gt;https://www.cyberrescue.co.uk/&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The insights presented highlight the urgent need for proactive cybersecurity measures to combat the increasing ransomware threat as the numbers continue to grow. As cybercriminals evolve and expand their reach, businesses must stay informed and prepared.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Keep an eye on our blog for these regular reports, and speak to our team today to learn how we can protect your business from ransomware and other cyber threats. Stay informed, stay secure, and stay ahead of cyber threats with &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2024%2F08%2F13%2Fmonthly-insights-on-ransomware-trends-and-statistics-2&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:46 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2024/08/13/monthly-insights-on-ransomware-trends-and-statistics-2</guid>
      <dc:date>2026-03-12T12:09:46Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Quantum Threats Are Here – Is Your Security Already.</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2025/05/16/quantum-threats-are-here</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2025/05/16/quantum-threats-are-here" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/Blog-Image.png" alt="Quantum Threats Are Here – Is Your Security Already." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt; 
     &lt;span style="color: #002060; font-family: Inter, -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; font-size: inherit; font-weight: inherit; background-color: transparent;"&gt;Quantum Threats Are Here – Is Your Security Already Obsolete?&lt;/span&gt; 
    &lt;/div&gt; 
    &lt;div class="container"&gt; 
     &lt;div class="row"&gt; 
      &lt;div class="col-xs-12"&gt; 
       &lt;div class="holder"&gt;
         &amp;nbsp; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Think quantum computing is a theoretical threat on the distant horizon? Think again. It’s a real and accelerating force that is already rewriting the rules of cybersecurity, and exposing a fatal flaw in how most organizations protect their data.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Here’s the uncomfortable truth: if your business is still relying on TLS, RSA, or traditional PKI, your encryption is on a countdown clock. And when quantum machines mature, that protection will become obsolete overnight.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This isn’t alarmism. It’s the reality security and compliance leaders must face now, because by the time quantum is mainstream, the damage will already be done.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Fact: Quantum Will Break Today’s Encryption&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The rise of quantum computing presents extraordinary opportunities. Government agencies, research labs, and big tech are pouring billions into quantum development. These machines will be capable of solving problems current systems can’t touch, including breaking the cryptographic foundations most organizations depend on.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Algorithms like RSA and ECC depend on the difficulty of factoring large numbers or solving discrete logarithm problems. Quantum computers, with Shor’s algorithm, will make short work of these defenses.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This is not the work of science fiction. And the global security community is responding accordingly. &lt;/span&gt;&lt;a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards"&gt;&lt;span style="font-weight: 400;"&gt;The U.S. National Institute of Standards and Technology (NIST) has already selected and begun standardizing post-quantum cryptographic (PQC) algorithms&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;. Why? Because current encryption will be completely useless in the quantum era.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;So if you’re securing critical data with RSA today, you’re effectively securing it with an expiration date.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Regulators Are Paying Attention to the Quantum Threat –&amp;nbsp;So Should You&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This shift isn’t just technical, it’s legal and financial. Under modern data protection laws, organizations have a responsibility to safeguard data against foreseeable threats. That includes quantum.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Regulations like:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;GDPR&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; requires &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;“state-of-the-art”&lt;/span&gt;&lt;/i&gt;&lt;span style="font-weight: 400;"&gt; technical measures to protect personal data, based on risk.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;DORA&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; mandates secure ICT risk management and operational resilience in financial institutions.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;NIS2&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; requires risk-based encryption and technical safeguards for critical infrastructure.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;a href="https://certes.ai/2025/05/12/cjis-compliance-quantum-safe-by-default/"&gt;&lt;strong&gt;CJIS&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; enforces full encryption key ownership&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; for agencies handling criminal justice data.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;All of these frameworks tie data protection to &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;ongoing risk awareness&lt;/span&gt;&lt;/i&gt;&lt;span style="font-weight: 400;"&gt;. And quantum is now a known, documented, and acknowledged threat.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Failing to act could mean failing compliance, leading to fines up to 4% of global revenue, criminal investigations, and executive liability. Going forward, failing to adopt quantum-safe measures could be viewed as negligence under similar scrutiny.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;“Harvest Now, Decrypt Later” Has Already Begun&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Cyber criminals aren’t waiting for quantum hardware to attack, they’re stealing encrypted data today, knowing they’ll be able to decrypt it later. This “harvest now, decrypt later” strategy turns delayed preparedness into an active vulnerability.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Nation-states and advanced persistent threats are stockpiling sensitive data right now –&amp;nbsp;financial records, medical information, trade secrets, law enforcement evidence –&amp;nbsp;counting on the inevitable arrival of quantum decryption capabilities.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Once quantum reaches the necessary scale, previously captured data can be exposed retroactively. If you didn’t protect it with post-quantum tools when it was collected, the damage is done. That’s why forward-looking security leaders are shifting now, not later.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Certes Is Ready for Quantum. Today.&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;At Certes, we’re not waiting for quantum threats to materialize. We’ve already &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;integrated &lt;/span&gt;&lt;strong&gt;quantum-safe algorithms&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; into our Data Protection and Risk Mitigation (DPRM) platform&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;, based on NIST-approved standards.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Our approach is different by design. Unlike traditional perimeter-based defenses that focus on keeping attackers out, Certes protects the data directly. &lt;/span&gt;&lt;a href="https://certes.ai/2024/10/07/protecting-data-in-transit/"&gt;&lt;span style="font-weight: 400;"&gt;Whether it’s in motion, at rest, or in use, the data remains protected with post-quantum safeguards.&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Our model delivers:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;a href="https://certes.ai/2025/05/12/cjis-compliance-quantum-safe-by-default/"&gt;&lt;strong&gt;Quantum-Safe Protection&lt;/strong&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;: PQC built into the data layer, not bolted on later.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Regulatory Readiness&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Supports GDPR, DORA, NIS2, CJIS compliance with enforced key ownership and audit-friendly controls.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Zero Trust Enablement&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: No trust in the network, full trust in the data.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Operational Longevity&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Future-proofs sensitive data so it’s not exposed years from now when legacy encryption collapses.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With Certes, businesses stay compliant and protected, regardless of what breakthroughs the next five years bring.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;strong&gt;The Longer You Wait for Quantum, the More You Risk&lt;/strong&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Post-quantum security isn’t a five-year roadmap. It’s a now problem. Because the breaches of 2029 are already underway in 2025, and they’re targeting the data you think is encrypted.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The executives, CISOs, and compliance leaders who take action and become Quantum-ready now will be the ones who avoid tomorrow’s headlines, regulatory actions, and boardroom blame.&lt;/span&gt;&lt;/p&gt; 
       &lt;h3&gt;&lt;strong&gt;Your Data May Be Secure Today. But Will It Still Be Secure Tomorrow?&lt;/strong&gt;&lt;/h3&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Quantum threats are already changing the rules. If your data protection strategy isn’t already quantum-safe, it’s already obsolete, non-compliant, and not enough.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;strong&gt;Certes is ready for the quantum era. Is your organization?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/post-quantum-cryptography-download/"&gt;Book a PQC readiness assessment&lt;/a&gt; with Certes.&lt;/p&gt; 
       &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
      &lt;/div&gt; 
      &lt;div class="col-md-12 plr-no padding-top-60"&gt; 
       &lt;div class="post-footer"&gt; 
        &lt;div class="post-tags"&gt; 
         &lt;ul class="list-unstyled"&gt; 
          &lt;li&gt;&lt;i class="fa fa-tags"&gt; &lt;/i&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/cybersecurity/"&gt; cybersecurity &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/dataprivacy/"&gt; dataprivacy &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/dataprotection/"&gt; dataprotection &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/protection/"&gt; protection &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/quantum/"&gt; Quantum &lt;/a&gt;&lt;/li&gt; 
         &lt;/ul&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt;
     &lt;span style="color: #002060; font-family: Inter, -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; font-size: inherit; font-weight: inherit; background-color: transparent;"&gt;Quantum Threats Are Here – Is Your Security Already Obsolete?&lt;/span&gt;
    &lt;/div&gt; 
    &lt;div class="container"&gt; 
     &lt;div class="row"&gt; 
      &lt;div class="col-xs-12"&gt; 
       &lt;div class="holder"&gt;
        &amp;nbsp;
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Think quantum computing is a theoretical threat on the distant horizon? Think again. It’s a real and accelerating force that is already rewriting the rules of cybersecurity, and exposing a fatal flaw in how most organizations protect their data.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Here’s the uncomfortable truth: if your business is still relying on TLS, RSA, or traditional PKI, your encryption is on a countdown clock. And when quantum machines mature, that protection will become obsolete overnight.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This isn’t alarmism. It’s the reality security and compliance leaders must face now, because by the time quantum is mainstream, the damage will already be done.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Fact: Quantum Will Break Today’s Encryption&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The rise of quantum computing presents extraordinary opportunities. Government agencies, research labs, and big tech are pouring billions into quantum development. These machines will be capable of solving problems current systems can’t touch, including breaking the cryptographic foundations most organizations depend on.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Algorithms like RSA and ECC depend on the difficulty of factoring large numbers or solving discrete logarithm problems. Quantum computers, with Shor’s algorithm, will make short work of these defenses.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This is not the work of science fiction. And the global security community is responding accordingly. &lt;/span&gt;&lt;a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards"&gt;&lt;span style="font-weight: 400;"&gt;The U.S. National Institute of Standards and Technology (NIST) has already selected and begun standardizing post-quantum cryptographic (PQC) algorithms&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;. Why? Because current encryption will be completely useless in the quantum era.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;So if you’re securing critical data with RSA today, you’re effectively securing it with an expiration date.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Regulators Are Paying Attention to the Quantum Threat –&amp;nbsp;So Should You&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This shift isn’t just technical, it’s legal and financial. Under modern data protection laws, organizations have a responsibility to safeguard data against foreseeable threats. That includes quantum.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Regulations like:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;GDPR&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; requires &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;“state-of-the-art”&lt;/span&gt;&lt;/i&gt;&lt;span style="font-weight: 400;"&gt; technical measures to protect personal data, based on risk.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;DORA&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; mandates secure ICT risk management and operational resilience in financial institutions.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;NIS2&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; requires risk-based encryption and technical safeguards for critical infrastructure.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;a href="https://certes.ai/2025/05/12/cjis-compliance-quantum-safe-by-default/"&gt;&lt;strong&gt;CJIS&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; enforces full encryption key ownership&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; for agencies handling criminal justice data.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;All of these frameworks tie data protection to &lt;/span&gt;&lt;i&gt;&lt;span style="font-weight: 400;"&gt;ongoing risk awareness&lt;/span&gt;&lt;/i&gt;&lt;span style="font-weight: 400;"&gt;. And quantum is now a known, documented, and acknowledged threat.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Failing to act could mean failing compliance, leading to fines up to 4% of global revenue, criminal investigations, and executive liability. Going forward, failing to adopt quantum-safe measures could be viewed as negligence under similar scrutiny.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;“Harvest Now, Decrypt Later” Has Already Begun&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Cyber criminals aren’t waiting for quantum hardware to attack, they’re stealing encrypted data today, knowing they’ll be able to decrypt it later. This “harvest now, decrypt later” strategy turns delayed preparedness into an active vulnerability.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Nation-states and advanced persistent threats are stockpiling sensitive data right now –&amp;nbsp;financial records, medical information, trade secrets, law enforcement evidence –&amp;nbsp;counting on the inevitable arrival of quantum decryption capabilities.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Once quantum reaches the necessary scale, previously captured data can be exposed retroactively. If you didn’t protect it with post-quantum tools when it was collected, the damage is done. That’s why forward-looking security leaders are shifting now, not later.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Certes Is Ready for Quantum. Today.&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;At Certes, we’re not waiting for quantum threats to materialize. We’ve already &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;integrated &lt;/span&gt;&lt;strong&gt;quantum-safe algorithms&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; into our Data Protection and Risk Mitigation (DPRM) platform&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;, based on NIST-approved standards.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Our approach is different by design. Unlike traditional perimeter-based defenses that focus on keeping attackers out, Certes protects the data directly. &lt;/span&gt;&lt;a href="https://certes.ai/2024/10/07/protecting-data-in-transit/"&gt;&lt;span style="font-weight: 400;"&gt;Whether it’s in motion, at rest, or in use, the data remains protected with post-quantum safeguards.&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Our model delivers:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;a href="https://certes.ai/2025/05/12/cjis-compliance-quantum-safe-by-default/"&gt;&lt;strong&gt;Quantum-Safe Protection&lt;/strong&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;: PQC built into the data layer, not bolted on later.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Regulatory Readiness&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Supports GDPR, DORA, NIS2, CJIS compliance with enforced key ownership and audit-friendly controls.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Zero Trust Enablement&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: No trust in the network, full trust in the data.&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;strong&gt;Operational Longevity&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Future-proofs sensitive data so it’s not exposed years from now when legacy encryption collapses.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With Certes, businesses stay compliant and protected, regardless of what breakthroughs the next five years bring.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;strong&gt;The Longer You Wait for Quantum, the More You Risk&lt;/strong&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Post-quantum security isn’t a five-year roadmap. It’s a now problem. Because the breaches of 2029 are already underway in 2025, and they’re targeting the data you think is encrypted.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The executives, CISOs, and compliance leaders who take action and become Quantum-ready now will be the ones who avoid tomorrow’s headlines, regulatory actions, and boardroom blame.&lt;/span&gt;&lt;/p&gt; 
       &lt;h3&gt;&lt;strong&gt;Your Data May Be Secure Today. But Will It Still Be Secure Tomorrow?&lt;/strong&gt;&lt;/h3&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Quantum threats are already changing the rules. If your data protection strategy isn’t already quantum-safe, it’s already obsolete, non-compliant, and not enough.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;strong&gt;Certes is ready for the quantum era. Is your organization?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/post-quantum-cryptography-download/"&gt;Book a PQC readiness assessment&lt;/a&gt; with Certes.&lt;/p&gt; 
       &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
      &lt;/div&gt; 
      &lt;div class="col-md-12 plr-no padding-top-60"&gt; 
       &lt;div class="post-footer"&gt; 
        &lt;div class="post-tags"&gt; 
         &lt;ul class="list-unstyled"&gt; 
          &lt;li&gt;&lt;i class="fa fa-tags"&gt; &lt;/i&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/cybersecurity/"&gt; cybersecurity &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/dataprivacy/"&gt; dataprivacy &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/dataprotection/"&gt; dataprotection &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/protection/"&gt; protection &lt;/a&gt;&lt;/li&gt; 
          &lt;li class="post-tags-item"&gt;&lt;a href="https://certes.ai/tag/quantum/"&gt; Quantum &lt;/a&gt;&lt;/li&gt; 
         &lt;/ul&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2025%2F05%2F16%2Fquantum-threats-are-here&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:45 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2025/05/16/quantum-threats-are-here</guid>
      <dc:date>2026-03-12T12:09:45Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Achieving DORA Compliance: Securing Data in Transit</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2024/10/03/achieving-dora-compliance</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2024/10/03/achieving-dora-compliance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/DORA-compliance.jpg" alt="Achieving DORA Compliance: Securing Data in Transit" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As digital financial services grow, so do the risks associated with cybersecurity, data breaches, and operational disruptions. The European Union’s Digital Operational Resilience Act (DORA), set to come into force in 2025, is a comprehensive regulation aimed at strengthening the digital resilience of financial institutions and businesses within the EU. Among the many aspects of digital resilience that DORA addresses, protecting data in transit plays a critical role in ensuring compliance with this regulation.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In this blog post, we will explore why safeguarding data in transit is essential under DORA and how it helps businesses meet compliance requirements while protecting sensitive financial information.&lt;/span&gt;&lt;/p&gt; 
       &lt;h1&gt;&lt;strong&gt;Understanding EU DORA Compliance and Its Objectives&lt;/strong&gt;&lt;/h1&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA’s primary objective is to ensure that financial institutions, including banks, insurance companies, and investment firms, can withstand, respond to, and recover from all types of IT disruptions, including cyberattacks. The regulation establishes a uniform set of rules for risk management, reporting, and compliance.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Among its core pillars, DORA focuses on:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li&gt;&lt;strong&gt;Risk Management&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Financial institutions must implement robust digital operational resilience frameworks, including securing data and systems.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Incident Reporting&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Firms are required to report cyber incidents to relevant authorities.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Third-Party Risk&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Managing risks related to third-party ICT service providers (e.g., cloud services).&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Testing and Audits&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Financial entities must undergo regular testing to ensure that their security systems are resilient to operational and cybersecurity risks.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;One of the critical aspects of operational resilience under DORA is securing data in transit, which is data actively moving across networks, whether between internal systems, external partners, or customers. This is particularly relevant for financial services, where sensitive personal and financial information is frequently transmitted.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why Protecting Data in Transit is Critical for DORA Compliance&lt;/strong&gt;&lt;/h2&gt; 
       &lt;ol&gt; 
        &lt;li&gt;&lt;strong&gt;Ensuring the Confidentiality of Sensitive Financial Data&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Financial institutions deal with highly sensitive information such as account details, financial transactions, and personal customer data. During transmission, this data is vulnerable to interception, manipulation, or unauthorized access if not properly secured. DORA emphasizes the need to maintain the confidentiality, integrity, and availabilit&lt;/span&gt;&lt;strong&gt;y&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; of data, making it essential to protect data in transit.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Under DORA, financial entities must ensure that their data management practices secure sensitive financial information during transmission. Encrypting data in transit with solutions such as &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; ensures that unauthorized actors cannot view or tamper with data, maintaining its confidentiality and integrity.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="2"&gt; 
        &lt;li&gt;&lt;strong&gt;Preventing Man-in-the-Middle (MITM) Attacks&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Man-in-the-middle (MITM) attacks pose a significant risk to data in transit. In these attacks, an unauthorized actor intercepts communications between two parties to either steal data or manipulate the transaction. MITM attacks are a common threat in financial services, where cybercriminals aim to intercept sensitive information or alter payment instructions.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA mandates that financial institutions protect data from unauthorized access and tampering. This includes securing all data transmissions between systems, third-party providers, and customers. End-to-end encryption of data in transit helps prevent MITM attacks, ensuring that financial data is protected as it travels across networks.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="3"&gt; 
        &lt;li&gt;&lt;strong&gt;Meeting Legal and Regulatory Requirements&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The financial industry is already highly regulated, with requirements from GDPR, PSD2, and now DORA adding further layers of compliance. Many of these regulations overlap, particularly concerning the protection of customer data. GDPR already mandates the protection of personal data during transmission, and DORA extends this requirement to encompass operational resilience against cyber threats.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Compliance with DORA means that financial institutions need to integrate cybersecurity practices that ensure data in transit is always protected. Failure to do so could lead to violations not only under DORA but also under other regulations like GDPR, leading to significant fines and penalties.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="4"&gt; 
        &lt;li&gt;&lt;strong&gt;Mitigating Third-Party Risks&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA emphasizes the need to manage risks associated with third-party IT service providers, such as cloud service providers, payment processors, and outsourced IT services. When data is transmitted between financial institutions and third parties, it is crucial to ensure that it is encrypted and protected during transmission to avoid unauthorized access or leaks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;To comply with DORA’s third-party risk management requirements financial firms must implement secure data-sharing protocols when working with third-party providers. Secure APIs, encryption of data in transit, and audit trails are key to ensuring that third parties handle financial data securely and that firms remain compliant.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="5"&gt; 
        &lt;li&gt;&lt;strong&gt;Proactively Guarding Against Data Breaches&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Data breaches not only compromise sensitive customer information but can also disrupt services, damage reputations, and result in significant financial losses. DORA mandates that financial institutions must implement proactive measures to safeguard digital systems and data to ensure continuous service availability and security.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA’s focus on operational resilience includes safeguarding data from breaches that could result from cyberattacks on data in transit. Encrypting data in transit reduces the likelihood of a data breach, ensuring compliance with DORA’s requirements for safeguarding customer data and ensuring operational continuity.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="6"&gt; 
        &lt;li&gt;&lt;strong&gt;Strengthening Customer Trust&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Protecting data in transit is not only about compliance but also about building trust with customers. Financial institutions that take steps to secure all aspects of their data flow, including data in transit, demonstrate a commitment to customer privacy and security. &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; is entirely focused on protecting data in transit using quantum techniques and keys that are unique to the customer resulting in highly secure transmission of customer data.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA places the customer at the center of its regulatory framework by emphasizing the need to ensure continuous, secure, and trustworthy financial services. By protecting data in transit, financial institutions can meet DORA’s requirements and reassure customers that their sensitive financial information is secure.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Best Practices for Securing Data in Transit to Ensure DORA Compliance&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;To ensure compliance with DORA, financial institutions should adopt the following best practices for securing data in transit:&lt;/span&gt;&lt;/p&gt; 
       &lt;ol&gt; 
        &lt;li&gt;&lt;strong&gt;Implement Strong Encryption Solutions&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Always encrypt data in transit using strong encryption solutions such as &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;. DPRM ensures that even if data is intercepted, it cannot be read or manipulated by unauthorized users. Each separate data flow is individually protected using Quantum-based techniques and the key is changed every hour.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="2"&gt; 
        &lt;li&gt;&lt;strong&gt;Enable End-to-End Encryption (E2EE)&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;E2EE ensures that data is encrypted at the source and only decrypted at the destination. This prevents any unauthorized interception during the transmission process, whether internally or externally. DPRM can protect the data from its source to destination irrespective if that is as a physical, virtual, container or in the Cloud supplied solution.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="3"&gt; 
        &lt;li&gt;&lt;strong&gt;Regular Security Audits and Testing&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA requires regular testing of operational resilience measures, including cybersecurity practices. Conduct penetration testing and vulnerability assessments to identify weaknesses in how data is transmitted and ensure compliance.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="4"&gt; 
        &lt;li&gt;&lt;strong&gt;Monitor and Log All Data Transfers&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Implement monitoring tools to log and audit all data transfers across your network. This helps detect any suspicious activities or unauthorized access attempts and ensures you can report incidents as required by DORA.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;strong&gt;Securing Data in Transit is Key to DORA Compliance&lt;/strong&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As the financial sector becomes more digitized, protecting data in transit is no longer optional — it’s a regulatory requirement. Under the EU DORA framework, ensuring the confidentiality, integrity, and security of financial data in transit is critical to building a robust and resilient cybersecurity posture. By deploying Certes DPRM to protect data in transit and managing third-party risks, financial institutions can achieve DORA compliance and safeguard their customers’ trust.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;For financial institutions operating within the EU, now is the time to assess your data protection strategies and prioritize securing data in transit as a key component of your DORA compliance efforts.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;By understanding the imp&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;ortance of protecting data in transit and implementing best practices, your organization will be well-prepared to meet the stringent requirements of DORA and maintain a secure, resilient digital financial infrastructure.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/contact/"&gt;&lt;span style="font-weight: 400;"&gt;Contact us&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; to find out more about how Certes empowers &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;organizations to navigate complex regulatory landscapes and fortify their defenses against evolving cyber threats.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As digital financial services grow, so do the risks associated with cybersecurity, data breaches, and operational disruptions. The European Union’s Digital Operational Resilience Act (DORA), set to come into force in 2025, is a comprehensive regulation aimed at strengthening the digital resilience of financial institutions and businesses within the EU. Among the many aspects of digital resilience that DORA addresses, protecting data in transit plays a critical role in ensuring compliance with this regulation.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In this blog post, we will explore why safeguarding data in transit is essential under DORA and how it helps businesses meet compliance requirements while protecting sensitive financial information.&lt;/span&gt;&lt;/p&gt; 
       &lt;h1&gt;&lt;strong&gt;Understanding EU DORA Compliance and Its Objectives&lt;/strong&gt;&lt;/h1&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA’s primary objective is to ensure that financial institutions, including banks, insurance companies, and investment firms, can withstand, respond to, and recover from all types of IT disruptions, including cyberattacks. The regulation establishes a uniform set of rules for risk management, reporting, and compliance.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Among its core pillars, DORA focuses on:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li&gt;&lt;strong&gt;Risk Management&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Financial institutions must implement robust digital operational resilience frameworks, including securing data and systems.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Incident Reporting&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Firms are required to report cyber incidents to relevant authorities.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Third-Party Risk&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Managing risks related to third-party ICT service providers (e.g., cloud services).&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Testing and Audits&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Financial entities must undergo regular testing to ensure that their security systems are resilient to operational and cybersecurity risks.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;One of the critical aspects of operational resilience under DORA is securing data in transit, which is data actively moving across networks, whether between internal systems, external partners, or customers. This is particularly relevant for financial services, where sensitive personal and financial information is frequently transmitted.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why Protecting Data in Transit is Critical for DORA Compliance&lt;/strong&gt;&lt;/h2&gt; 
       &lt;ol&gt; 
        &lt;li&gt;&lt;strong&gt;Ensuring the Confidentiality of Sensitive Financial Data&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Financial institutions deal with highly sensitive information such as account details, financial transactions, and personal customer data. During transmission, this data is vulnerable to interception, manipulation, or unauthorized access if not properly secured. DORA emphasizes the need to maintain the confidentiality, integrity, and availabilit&lt;/span&gt;&lt;strong&gt;y&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt; of data, making it essential to protect data in transit.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Under DORA, financial entities must ensure that their data management practices secure sensitive financial information during transmission. Encrypting data in transit with solutions such as &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; ensures that unauthorized actors cannot view or tamper with data, maintaining its confidentiality and integrity.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="2"&gt; 
        &lt;li&gt;&lt;strong&gt;Preventing Man-in-the-Middle (MITM) Attacks&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Man-in-the-middle (MITM) attacks pose a significant risk to data in transit. In these attacks, an unauthorized actor intercepts communications between two parties to either steal data or manipulate the transaction. MITM attacks are a common threat in financial services, where cybercriminals aim to intercept sensitive information or alter payment instructions.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA mandates that financial institutions protect data from unauthorized access and tampering. This includes securing all data transmissions between systems, third-party providers, and customers. End-to-end encryption of data in transit helps prevent MITM attacks, ensuring that financial data is protected as it travels across networks.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="3"&gt; 
        &lt;li&gt;&lt;strong&gt;Meeting Legal and Regulatory Requirements&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The financial industry is already highly regulated, with requirements from GDPR, PSD2, and now DORA adding further layers of compliance. Many of these regulations overlap, particularly concerning the protection of customer data. GDPR already mandates the protection of personal data during transmission, and DORA extends this requirement to encompass operational resilience against cyber threats.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Compliance with DORA means that financial institutions need to integrate cybersecurity practices that ensure data in transit is always protected. Failure to do so could lead to violations not only under DORA but also under other regulations like GDPR, leading to significant fines and penalties.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="4"&gt; 
        &lt;li&gt;&lt;strong&gt;Mitigating Third-Party Risks&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA emphasizes the need to manage risks associated with third-party IT service providers, such as cloud service providers, payment processors, and outsourced IT services. When data is transmitted between financial institutions and third parties, it is crucial to ensure that it is encrypted and protected during transmission to avoid unauthorized access or leaks.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;To comply with DORA’s third-party risk management requirements financial firms must implement secure data-sharing protocols when working with third-party providers. Secure APIs, encryption of data in transit, and audit trails are key to ensuring that third parties handle financial data securely and that firms remain compliant.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="5"&gt; 
        &lt;li&gt;&lt;strong&gt;Proactively Guarding Against Data Breaches&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Data breaches not only compromise sensitive customer information but can also disrupt services, damage reputations, and result in significant financial losses. DORA mandates that financial institutions must implement proactive measures to safeguard digital systems and data to ensure continuous service availability and security.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA’s focus on operational resilience includes safeguarding data from breaches that could result from cyberattacks on data in transit. Encrypting data in transit reduces the likelihood of a data breach, ensuring compliance with DORA’s requirements for safeguarding customer data and ensuring operational continuity.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="6"&gt; 
        &lt;li&gt;&lt;strong&gt;Strengthening Customer Trust&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Protecting data in transit is not only about compliance but also about building trust with customers. Financial institutions that take steps to secure all aspects of their data flow, including data in transit, demonstrate a commitment to customer privacy and security. &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; is entirely focused on protecting data in transit using quantum techniques and keys that are unique to the customer resulting in highly secure transmission of customer data.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA places the customer at the center of its regulatory framework by emphasizing the need to ensure continuous, secure, and trustworthy financial services. By protecting data in transit, financial institutions can meet DORA’s requirements and reassure customers that their sensitive financial information is secure.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Best Practices for Securing Data in Transit to Ensure DORA Compliance&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;To ensure compliance with DORA, financial institutions should adopt the following best practices for securing data in transit:&lt;/span&gt;&lt;/p&gt; 
       &lt;ol&gt; 
        &lt;li&gt;&lt;strong&gt;Implement Strong Encryption Solutions&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Always encrypt data in transit using strong encryption solutions such as &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;. DPRM ensures that even if data is intercepted, it cannot be read or manipulated by unauthorized users. Each separate data flow is individually protected using Quantum-based techniques and the key is changed every hour.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="2"&gt; 
        &lt;li&gt;&lt;strong&gt;Enable End-to-End Encryption (E2EE)&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;E2EE ensures that data is encrypted at the source and only decrypted at the destination. This prevents any unauthorized interception during the transmission process, whether internally or externally. DPRM can protect the data from its source to destination irrespective if that is as a physical, virtual, container or in the Cloud supplied solution.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="3"&gt; 
        &lt;li&gt;&lt;strong&gt;Regular Security Audits and Testing&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;DORA requires regular testing of operational resilience measures, including cybersecurity practices. Conduct penetration testing and vulnerability assessments to identify weaknesses in how data is transmitted and ensure compliance.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="4"&gt; 
        &lt;li&gt;&lt;strong&gt;Monitor and Log All Data Transfers&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Implement monitoring tools to log and audit all data transfers across your network. This helps detect any suspicious activities or unauthorized access attempts and ensures you can report incidents as required by DORA.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;strong&gt;Securing Data in Transit is Key to DORA Compliance&lt;/strong&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As the financial sector becomes more digitized, protecting data in transit is no longer optional — it’s a regulatory requirement. Under the EU DORA framework, ensuring the confidentiality, integrity, and security of financial data in transit is critical to building a robust and resilient cybersecurity posture. By deploying Certes DPRM to protect data in transit and managing third-party risks, financial institutions can achieve DORA compliance and safeguard their customers’ trust.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;For financial institutions operating within the EU, now is the time to assess your data protection strategies and prioritize securing data in transit as a key component of your DORA compliance efforts.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;By understanding the imp&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;ortance of protecting data in transit and implementing best practices, your organization will be well-prepared to meet the stringent requirements of DORA and maintain a secure, resilient digital financial infrastructure.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/contact/"&gt;&lt;span style="font-weight: 400;"&gt;Contact us&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; to find out more about how Certes empowers &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;organizations to navigate complex regulatory landscapes and fortify their defenses against evolving cyber threats.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2024%2F10%2F03%2Fachieving-dora-compliance&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:44 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2024/10/03/achieving-dora-compliance</guid>
      <dc:date>2026-03-12T12:09:44Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Certes Networks announces partnership with EU Commission - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/06/certes-announces-on-going-partnership-with-eu-commission</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2019/09/06/certes-announces-on-going-partnership-with-eu-commission" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/CN-_-EU-NEWS.png" alt="Certes Networks announces partnership with EU Commission - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;div class="page"&gt; 
            &lt;div class="section"&gt; 
             &lt;div class="layoutArea"&gt; 
              &lt;div class="column"&gt; 
               &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 14pt;"&gt;Certes Networks announces it has been selected by the EU Commission as a trusted cybersecurity technology provider.&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
              &lt;/div&gt; 
             &lt;/div&gt; 
            &lt;/div&gt; 
           &lt;/div&gt; 
           &lt;div class="page"&gt; 
            &lt;div class="section"&gt; 
             &lt;div class="layoutArea"&gt; 
              &lt;div class="column"&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;20 April, Pittsburgh MA,&lt;/strong&gt; Certes Networks, an innovator in software-defined security solutions, today announces its work as an on-going provider of cyber- security solutions to secure data-in-motion for the EU commission.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Handling sensitive data from its 28 member states, the EU Commission has selected Certes Networks as part of an official procurement framework, based on its proven ability to encrypt and protect data in motion. This extends the relationship between Certes Networks and the European Commission, who have been working together since 2012.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;The European Commission is the EU’s politically independent executive arm and is responsible for all new European legislation proposals, and the implementation of decisions of the European Parliament and the Council&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 14pt;"&gt;of the EU.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Paul German, President and CEO at Certes Networks commented, “We are very proud to continue our on-going relationship with the European Commission based on our proven ability to protect sensitive data-in-motion. With the introduction of GDPR, and based on the success over the last 5 years, we are delighted to be able to continue to protect the data of the EU citizens through our work with the European Commission, but also assisting organisations looking for innovative security solutions to help meet the new regulatory demands.”&lt;/span&gt;&lt;/p&gt; 
              &lt;/div&gt; 
             &lt;/div&gt; 
            &lt;/div&gt; 
           &lt;/div&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;div class="page"&gt; 
            &lt;div class="section"&gt; 
             &lt;div class="layoutArea"&gt; 
              &lt;div class="column"&gt; 
               &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 14pt;"&gt;Certes Networks announces it has been selected by the EU Commission as a trusted cybersecurity technology provider.&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
              &lt;/div&gt; 
             &lt;/div&gt; 
            &lt;/div&gt; 
           &lt;/div&gt; 
           &lt;div class="page"&gt; 
            &lt;div class="section"&gt; 
             &lt;div class="layoutArea"&gt; 
              &lt;div class="column"&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;20 April, Pittsburgh MA,&lt;/strong&gt; Certes Networks, an innovator in software-defined security solutions, today announces its work as an on-going provider of cyber- security solutions to secure data-in-motion for the EU commission.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Handling sensitive data from its 28 member states, the EU Commission has selected Certes Networks as part of an official procurement framework, based on its proven ability to encrypt and protect data in motion. This extends the relationship between Certes Networks and the European Commission, who have been working together since 2012.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;The European Commission is the EU’s politically independent executive arm and is responsible for all new European legislation proposals, and the implementation of decisions of the European Parliament and the Council&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 14pt;"&gt;of the EU.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Paul German, President and CEO at Certes Networks commented, “We are very proud to continue our on-going relationship with the European Commission based on our proven ability to protect sensitive data-in-motion. With the introduction of GDPR, and based on the success over the last 5 years, we are delighted to be able to continue to protect the data of the EU citizens through our work with the European Commission, but also assisting organisations looking for innovative security solutions to help meet the new regulatory demands.”&lt;/span&gt;&lt;/p&gt; 
              &lt;/div&gt; 
             &lt;/div&gt; 
            &lt;/div&gt; 
           &lt;/div&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2019%2F09%2F06%2Fcertes-announces-on-going-partnership-with-eu-commission&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:44 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/06/certes-announces-on-going-partnership-with-eu-commission</guid>
      <dc:date>2026-03-12T12:09:44Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Keeping Data Secure in the Oil &amp; Gas Industry - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/04/keeping-data-secure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2019/09/04/keeping-data-secure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/CN_NEWS-Oil-Gas.png" alt="Keeping Data Secure in the Oil &amp;amp; Gas Industry - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;h3&gt;Keeping Data Secure on Oil and Gas Industry&lt;/h3&gt; 
           &lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Author: Jerry Askar, Managing Director Middle East, Levant &amp;amp; Africa, Certes Networks&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 12pt;"&gt;As published in &lt;a href="https://www.professionalsecurity.co.uk/news/interviews/keeping-data-secure-in-oil-and-gas/"&gt;Professional Security Magazine&lt;/a&gt;, August 2019; &lt;a href="https://www.infosecurity-magazine.com/opinions/secure-oil-gas/"&gt;InfoSecurity Magazine&lt;/a&gt;, September 4, 2019; and, Security Middle East, upcoming September 2019 issue.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As automation continues to evolve, the utilities sector is finding that encryption of their network data is a critical to safeguard against cyber-attacks. And, as organisations across the globe continue to prioritise cybersecurity, the threat landscape continues to expand. Although good progress is being made, it is evident that critical network vulnerabilities are still being left unprotected.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;This is particularly the case in the oil and gas sector, which is the latest to enter the cyber security spotlight according to the &lt;a href="https://dragos.com/resource/dragos-oil-and-gas-threat-perspective-summary/"&gt;latest threat report&lt;/a&gt; by security firm &lt;a href="https://dragos.com/"&gt;Dragos&lt;/a&gt; that highlighted that the sector is a valuable target for adversaries seeking to exploit industrial control systems (ICS) environments. The report revealed a new activity group targeting the industry, bringing the total number of tracked ICS-targeted activity groups to nine, five of which directly target oil and gas organisations. What’s more, the increased deployment of automation within the oil and gas industry to manage costs, extract the most value from current assets and maximise up-time, only causes the threats to ICS and supervisory control and data acquisition (SCADA) networks to rise.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;The threat is clearly high, as are the potential consequences of a cyber-attack on this sector. An attack on an oil or gas organisation would not only have severe political and economic impacts, but it would also have a direct effect on civilian lives and national infrastructure. Much of how the population lives and works is dependent upon the energy from oil and gas production, from communication, the use of electronic devices and appliances, and even heating, cooling and cooking. The smallest attack on this sector could have devastating effects.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Beyond consumer impact, an oil or gas company hit by a cyber-attack could experience a plant or production shutdown, utilities interruptions, equipment damage or loss of quality, undetected spills and of course safety measure violations. For example, in December 2018, Saipem, an Italian oil and gas industry contractor, &lt;a href="https://www.rigzone.com/news/saipem_reveals_extent_of_cyber_attack-13-dec-2018-157711-article/"&gt;fell victim to a cyber-attack&lt;/a&gt; that hit servers based in the Middle East, India, Aberdeen and Italy, which led to the cancellation of data and infrastructures.&lt;/span&gt;&lt;/p&gt; 
           &lt;div class="page"&gt; 
            &lt;div class="section"&gt; 
             &lt;div class="layoutArea"&gt; 
              &lt;div class="column"&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Mitigating Cyber-attack Damage&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Understanding not just the threats faced by this sector, but also how the attacks are taking place and the behaviors and capabilities of activity groups targeting oil and gas companies, is essential. As the Dragos report warned, there is currently limited visibility – and observability –into the network ecosystem, including communications to and from operations centers, distribution substations and even home “smart grid” networks. This means that intruders can dwell for longer and the root cause of the attack can remain undetected. As is widely documented, the longer an attacker remains in a network, the more damage the breach will cause.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;To protect data in ICS/SCADA environments, organisations in the oil and gas industry need an encryption solution that not only safely encrypts data enterprise-wide, but that is also scalable and easy to implement, without disrupting, replacing or moving the network infrastructure. Furthermore, some encryption technologies will provide organisations with greater visibility of their data to monitor deployed policies. By defining and deploying policies and keys based only on which users should have access to what data, organisations can ensure that only those who need to send or receive the data have the access to do so. In addition, new Observability tools can provide crucial flow data so that IT operators can observe policy enforcement and quickly shut down a policy if compromised to stop further damage and potential escalation.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Lessons need to be learned from the past attacks on the oil and gas industry, such as the &lt;a href="https://www.rigzone.com/news/saipem_reveals_extent_of_cyber_attack-13-dec-2018-157711-article/"&gt;Saipem attack&lt;/a&gt; which had global consequences. With the sector facing such a high cyber risk, it’s more crucial than ever for oil and gas organisations to inhabit a cyber security culture and move from reactionary to proactive. This means employing an encryption management solution, along with the right forensic intelligence tools, to understand and safeguard against future cyber-attacks and their potential for devastating consequences.&lt;/span&gt;&lt;/p&gt; 
              &lt;/div&gt; 
             &lt;/div&gt; 
            &lt;/div&gt; 
           &lt;/div&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;div class="page"&gt; 
        &lt;div class="section"&gt; 
         &lt;div class="layoutArea"&gt; 
          &lt;div class="column"&gt; 
           &lt;h3&gt;Keeping Data Secure on Oil and Gas Industry&lt;/h3&gt; 
           &lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Author: Jerry Askar, Managing Director Middle East, Levant &amp;amp; Africa, Certes Networks&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 12pt;"&gt;As published in &lt;a href="https://www.professionalsecurity.co.uk/news/interviews/keeping-data-secure-in-oil-and-gas/"&gt;Professional Security Magazine&lt;/a&gt;, August 2019; &lt;a href="https://www.infosecurity-magazine.com/opinions/secure-oil-gas/"&gt;InfoSecurity Magazine&lt;/a&gt;, September 4, 2019; and, Security Middle East, upcoming September 2019 issue.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;p&gt;&amp;nbsp;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As automation continues to evolve, the utilities sector is finding that encryption of their network data is a critical to safeguard against cyber-attacks. And, as organisations across the globe continue to prioritise cybersecurity, the threat landscape continues to expand. Although good progress is being made, it is evident that critical network vulnerabilities are still being left unprotected.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;This is particularly the case in the oil and gas sector, which is the latest to enter the cyber security spotlight according to the &lt;a href="https://dragos.com/resource/dragos-oil-and-gas-threat-perspective-summary/"&gt;latest threat report&lt;/a&gt; by security firm &lt;a href="https://dragos.com/"&gt;Dragos&lt;/a&gt; that highlighted that the sector is a valuable target for adversaries seeking to exploit industrial control systems (ICS) environments. The report revealed a new activity group targeting the industry, bringing the total number of tracked ICS-targeted activity groups to nine, five of which directly target oil and gas organisations. What’s more, the increased deployment of automation within the oil and gas industry to manage costs, extract the most value from current assets and maximise up-time, only causes the threats to ICS and supervisory control and data acquisition (SCADA) networks to rise.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;The threat is clearly high, as are the potential consequences of a cyber-attack on this sector. An attack on an oil or gas organisation would not only have severe political and economic impacts, but it would also have a direct effect on civilian lives and national infrastructure. Much of how the population lives and works is dependent upon the energy from oil and gas production, from communication, the use of electronic devices and appliances, and even heating, cooling and cooking. The smallest attack on this sector could have devastating effects.&lt;/span&gt;&lt;/p&gt; 
           &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Beyond consumer impact, an oil or gas company hit by a cyber-attack could experience a plant or production shutdown, utilities interruptions, equipment damage or loss of quality, undetected spills and of course safety measure violations. For example, in December 2018, Saipem, an Italian oil and gas industry contractor, &lt;a href="https://www.rigzone.com/news/saipem_reveals_extent_of_cyber_attack-13-dec-2018-157711-article/"&gt;fell victim to a cyber-attack&lt;/a&gt; that hit servers based in the Middle East, India, Aberdeen and Italy, which led to the cancellation of data and infrastructures.&lt;/span&gt;&lt;/p&gt; 
           &lt;div class="page"&gt; 
            &lt;div class="section"&gt; 
             &lt;div class="layoutArea"&gt; 
              &lt;div class="column"&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Mitigating Cyber-attack Damage&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Understanding not just the threats faced by this sector, but also how the attacks are taking place and the behaviors and capabilities of activity groups targeting oil and gas companies, is essential. As the Dragos report warned, there is currently limited visibility – and observability –into the network ecosystem, including communications to and from operations centers, distribution substations and even home “smart grid” networks. This means that intruders can dwell for longer and the root cause of the attack can remain undetected. As is widely documented, the longer an attacker remains in a network, the more damage the breach will cause.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;To protect data in ICS/SCADA environments, organisations in the oil and gas industry need an encryption solution that not only safely encrypts data enterprise-wide, but that is also scalable and easy to implement, without disrupting, replacing or moving the network infrastructure. Furthermore, some encryption technologies will provide organisations with greater visibility of their data to monitor deployed policies. By defining and deploying policies and keys based only on which users should have access to what data, organisations can ensure that only those who need to send or receive the data have the access to do so. In addition, new Observability tools can provide crucial flow data so that IT operators can observe policy enforcement and quickly shut down a policy if compromised to stop further damage and potential escalation.&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
               &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Lessons need to be learned from the past attacks on the oil and gas industry, such as the &lt;a href="https://www.rigzone.com/news/saipem_reveals_extent_of_cyber_attack-13-dec-2018-157711-article/"&gt;Saipem attack&lt;/a&gt; which had global consequences. With the sector facing such a high cyber risk, it’s more crucial than ever for oil and gas organisations to inhabit a cyber security culture and move from reactionary to proactive. This means employing an encryption management solution, along with the right forensic intelligence tools, to understand and safeguard against future cyber-attacks and their potential for devastating consequences.&lt;/span&gt;&lt;/p&gt; 
              &lt;/div&gt; 
             &lt;/div&gt; 
            &lt;/div&gt; 
           &lt;/div&gt; 
          &lt;/div&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2019%2F09%2F04%2Fkeeping-data-secure&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:43 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/04/keeping-data-secure</guid>
      <dc:date>2026-03-12T12:09:43Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Embracing the Quantum Age: Pioneering Data Privacy - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2024/05/01/embracing-the-quantum-age</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2024/05/01/embracing-the-quantum-age" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/Quantum-Computing-Blog-Thumbnail.png" alt="Embracing the Quantum Age: Pioneering Data Privacy - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Quantum computing is often hailed as the next industrial revolution, transforming everything from machine learning to cryptography. With its potential to increase computational power, the implications for data privacy are profound and immediate.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The quantum computing market is expected to grow significantly, reaching &lt;/span&gt;&lt;a href="https://www.marketsandmarkets.com/Market-Reports/quantum-computing-market-144888301.html"&gt;&lt;span style="font-weight: 400;"&gt;$1.7 billion&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; by 2026, so the need for quantum-safe encryption solutions becomes urgent.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;The Quantum Threat to Cryptography&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Traditional cryptographic systems, which underpin modern digital security, depend on complex mathematical challenges that are tough for classical computers to crack. However, quantum computers, using principles of quantum mechanics like superposition and entanglement, can solve these problems much faster. This capability poses a direct threat to encryption methods such as RSA, making the current cryptographic standards exposed and vulnerable.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Shor’s and Grover’s algorithms are prime examples of how quantum computing can disrupt current security systems. Shor’s algorithm, for instance, can factor large numbers much more efficiently than classical computers, which is a critical blow to RSA encryption. Meanwhile, Grover’s algorithm improves the efficiency of unstructured searches, enhancing the capabilities of brute-force attacks.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;Innovative Responses to Quantum Challenges&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In light of these challenges, Data Protection and Risk Mitigation (DPRM) is leading the way by integrating quantum physics into the generation of key materials and adopting the latest quantum-safe algorithms.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This proactive approach not only fortifies data protection but also ensures that organisations are ready and future-proofed for the quantum era.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Quantum Key Distribution and Quantum Random Numbers&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;A key feature of quantum-safe cryptography is Quantum Key Distribution (QKD), which uses quantum mechanics to provide secure communication channels which are immune to computational attacks. Additionally, quantum random numbers, which are fundamental to generating cryptographic keys, offer a new level of security by leveraging the inherent randomness of quantum processes.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;Navigating Challenges and Opportunities&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Despite its potential, quantum computing comes with its own set of challenges, such as:&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Decoherence&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Error Correction&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;and Scalability.&amp;nbsp;&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;These technical hurdles provide opportunities for innovation in quantum error correction techniques and fault-tolerant architectures. The continuous development of these areas is critical for the practical implementation of quantum computing.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 12pt;"&gt;The Road Ahead for Quantum-Safe Cryptography&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As we enter the quantum era, the transition to quantum-safe cryptography is not just advisable but essential. This shift involves updating cryptographic standards, deploying new encryption solutions, and widespread education on the importance of quantum-resistant methods. For example, integrating quantum-safe solutions into existing infrastructures will require significant collaboration across various sectors.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM’s commitment to quantum-safe technologies makes it a valuable ally to safeguard data privacy. By offering advanced quantum-resistant solutions, and setting new standards in cybersecurity, DPRM helps organisations protect their most valuable asset—their sensitive data—from emerging quantum threats.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The rise of quantum computing is both an opportunity and a challenge in the field of data privacy. With its pioneering efforts in quantum-safe solutions, Certes DPRM is leading the charge in preparing for a secure quantum future.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As we stand on the brink of this new technological era, embracing quantum-safe encryption is not merely an option—it is a necessity to secure our digital future. To learn more about how we’re placing&lt;/span&gt; &lt;span style="font-weight: 400;"&gt;quantum-safe security at the forefront view our whitepaper &lt;/span&gt;&lt;a href="https://certes.ai/wp-content/uploads/2024/04/Certes-Quantum-Computing-and-The-Future-of-Data-Privacy.pdf"&gt;&lt;span style="font-weight: 400;"&gt;here &lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;or&lt;/span&gt; &lt;a href="https://certes.ai/post-quantum-cryptography-download/"&gt;book a PQC readiness assessment&lt;/a&gt;&amp;nbsp;with Certes.&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Quantum computing is often hailed as the next industrial revolution, transforming everything from machine learning to cryptography. With its potential to increase computational power, the implications for data privacy are profound and immediate.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The quantum computing market is expected to grow significantly, reaching &lt;/span&gt;&lt;a href="https://www.marketsandmarkets.com/Market-Reports/quantum-computing-market-144888301.html"&gt;&lt;span style="font-weight: 400;"&gt;$1.7 billion&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; by 2026, so the need for quantum-safe encryption solutions becomes urgent.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;The Quantum Threat to Cryptography&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Traditional cryptographic systems, which underpin modern digital security, depend on complex mathematical challenges that are tough for classical computers to crack. However, quantum computers, using principles of quantum mechanics like superposition and entanglement, can solve these problems much faster. This capability poses a direct threat to encryption methods such as RSA, making the current cryptographic standards exposed and vulnerable.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Shor’s and Grover’s algorithms are prime examples of how quantum computing can disrupt current security systems. Shor’s algorithm, for instance, can factor large numbers much more efficiently than classical computers, which is a critical blow to RSA encryption. Meanwhile, Grover’s algorithm improves the efficiency of unstructured searches, enhancing the capabilities of brute-force attacks.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;Innovative Responses to Quantum Challenges&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In light of these challenges, Data Protection and Risk Mitigation (DPRM) is leading the way by integrating quantum physics into the generation of key materials and adopting the latest quantum-safe algorithms.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This proactive approach not only fortifies data protection but also ensures that organisations are ready and future-proofed for the quantum era.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Quantum Key Distribution and Quantum Random Numbers&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;A key feature of quantum-safe cryptography is Quantum Key Distribution (QKD), which uses quantum mechanics to provide secure communication channels which are immune to computational attacks. Additionally, quantum random numbers, which are fundamental to generating cryptographic keys, offer a new level of security by leveraging the inherent randomness of quantum processes.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;Navigating Challenges and Opportunities&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Despite its potential, quantum computing comes with its own set of challenges, such as:&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Decoherence&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;Error Correction&lt;/span&gt;&lt;/li&gt; 
        &lt;li style="font-weight: 400;"&gt;&lt;span style="font-weight: 400;"&gt;and Scalability.&amp;nbsp;&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;These technical hurdles provide opportunities for innovation in quantum error correction techniques and fault-tolerant architectures. The continuous development of these areas is critical for the practical implementation of quantum computing.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 12pt;"&gt;The Road Ahead for Quantum-Safe Cryptography&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As we enter the quantum era, the transition to quantum-safe cryptography is not just advisable but essential. This shift involves updating cryptographic standards, deploying new encryption solutions, and widespread education on the importance of quantum-resistant methods. For example, integrating quantum-safe solutions into existing infrastructures will require significant collaboration across various sectors.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Certes DPRM’s commitment to quantum-safe technologies makes it a valuable ally to safeguard data privacy. By offering advanced quantum-resistant solutions, and setting new standards in cybersecurity, DPRM helps organisations protect their most valuable asset—their sensitive data—from emerging quantum threats.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The rise of quantum computing is both an opportunity and a challenge in the field of data privacy. With its pioneering efforts in quantum-safe solutions, Certes DPRM is leading the charge in preparing for a secure quantum future.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As we stand on the brink of this new technological era, embracing quantum-safe encryption is not merely an option—it is a necessity to secure our digital future. To learn more about how we’re placing&lt;/span&gt; &lt;span style="font-weight: 400;"&gt;quantum-safe security at the forefront view our whitepaper &lt;/span&gt;&lt;a href="https://certes.ai/wp-content/uploads/2024/04/Certes-Quantum-Computing-and-The-Future-of-Data-Privacy.pdf"&gt;&lt;span style="font-weight: 400;"&gt;here &lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;or&lt;/span&gt; &lt;a href="https://certes.ai/post-quantum-cryptography-download/"&gt;book a PQC readiness assessment&lt;/a&gt;&amp;nbsp;with Certes.&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2024%2F05%2F01%2Fembracing-the-quantum-age&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:43 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2024/05/01/embracing-the-quantum-age</guid>
      <dc:date>2026-03-12T12:09:43Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Why Protecting Data in Transit Should Be Your Top Priority</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2024/10/03/protecting-data-in-transit</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2024/10/03/protecting-data-in-transit" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/Data-in-transit.jpg" alt="Why Protecting Data in Transit Should Be Your Top Priority" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt; 
     &lt;strong style="color: #002060; font-family: Inter, -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; font-size: inherit; background-color: transparent;"&gt;Why Protecting Data in Transit Should Be Your Top Priority – Not Just Monitoring Network Activity&lt;/strong&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In seeking to protect valuable, sensitive information that all businesses maintain, many organizations prioritize network activity monitoring as their primary line of defense against cyber threats. While monitoring is important, it’s not enough on its own. One of the most overlooked but critical aspects of security is protecting data in transit — the data that moves between devices, networks, or cloud services.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In this blog post, we’ll explain why focusing on securing data in transit is essential and how it can protect your business from sophisticated cyber threats. We’ll also highlight how data protection through quantum cryoptography and security best practices can give you peace of mind that monitoring alone can’t provide.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;The Growing Threat to Data in Transit&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;When data is transmitted between different points (like between your company’s internal network and an external cloud server), it’s particularly vulnerable to attacks. This stage of data movement is known as data in transit or data in motion. Hackers constantly look for opportunities to intercept this data during transmission, hoping to steal, manipulate, or exploit it for malicious purposes.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Common threats to data in transit include:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li&gt;&lt;strong&gt;Man-in-the-middle (MITM) attacks&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Hackers position themselves between two communicating parties to intercept and even alter the data being sent.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Eavesdropping&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Cybercriminals can listen in on unencrypted communications, capturing sensitive information like passwords, financial data, or personal details.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Packet sniffing&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Attackers use special tools to capture and analyze data packets as they travel across networks, which can expose confidential data.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;While monitoring network activity helps detect these kinds of attacks after they happen, it doesn’t prevent them. This is where the focus on securing data in transit comes into play.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why Protecting Data in Transit Matters More Than You Think&lt;/strong&gt;&lt;/h2&gt; 
       &lt;ol&gt; 
        &lt;li&gt;&lt;strong&gt;Prevention is Better Than Detection&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Monitoring network traffic helps identify suspicious activity, but it’s reactive. By the time a threat is detected, the damage may already be done. On the other hand, protecting data in transit with strong quantum based encryption actively prevents hackers from being able to read or exploit sensitive information, even if they manage to intercept it.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Imagine sending an unencrypted email that contains your company’s financial data. If a hacker intercepts that communication, they can read it easily. Now, if that email is protected by strong cryptography and a key controlled by the customer, even if it’s intercepted, the hacker will be unable to decipher the information.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="2"&gt; 
        &lt;li&gt;&lt;strong&gt;Comply with Regulations and Standards&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Protecting data in transit is often a regulatory requirement. Many data protection regulations, such as GDPR, HIPAA, and PCI DSS, require businesses to encrypt sensitive data during transmission. Non-compliance can result in heavy fines and penalties, not to mention the loss of customer trust.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;For example, Payment Card Industry Data Security Standard (PCI DSS) requires credit card data transmitted over public networks to be encrypted. Simply monitoring your network won’t meet this standard, but encrypting your data in transit will.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="3"&gt; 
        &lt;li&gt;&lt;strong&gt;Guard Against Man-in-the-Middle (MITM) Attacks&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;MITM attacks can happen on any network, especially unsecured ones like public Wi-Fi. In these attacks, an attacker intercepts the data being sent between a sender and receiver, without either party knowing. They can steal login credentials, personal information, or other sensitive data. Protecting data in transit using end-to-end encryption can prevent attackers from accessing or tampering with your data, even if they manage to intercept it.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="4"&gt; 
        &lt;li&gt;&lt;strong&gt;Secure Communication with Cloud Services&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With more businesses moving their operations to the cloud, ensuring secure communication between local systems and cloud services is vital. Data traveling to and from the cloud needs strong encryption to prevent exposure during transmission.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Without encrypting data in transit, your sensitive information could be intercepted at various points on its journey to the cloud provider.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="5"&gt; 
        &lt;li&gt;&lt;strong&gt;Prevent Unauthorized Data Modification&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Not only can attackers steal data in transit, but they can also modify it. Imagine a scenario where an attacker intercepts and changes a file during transmission, potentially causing irreversible damage or confusion.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Encryption protects against unauthorized data modification by ensuring the data’s integrity. This is particularly important when used in conjunction with immutable backup solutions – the backup is only as good as the data it receives, if that data is tampered with then the backup is useless.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;How to Effectively Protect Data in Transit&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;To safeguard data in transit, you need to take proactive steps. Start from the assumption that your data will be the target of an attack and plan accordingly. A solution such as &lt;a href="https://certes.ai/dprm/"&gt;Certes DPRM&lt;/a&gt; (Data Protection and Risk Mitigation) is focused on protecting the data in transit, it does this in a way that is transparent to other network devices and services. The data is protected using quantum based techniques and includes key material unique to the customer that is changed per data flow every hour. The result is a data set that is only available to the customer and their intended recipient and no one else – no service provider, no network vendor and certainly no attacker.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Don’t Just Monitor, Secure Your Data&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;While monitoring network activity is an essential part of a strong security posture, it’s only one piece of the puzzle. Protecting data in transit is proactive, ensuring that your sensitive information remains safe even if it’s intercepted by malicious actors. By adopting Certes DPRM, and best practices, you can prevent many common cyberattacks and keep your business safe.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Remember, prevention is key in cybersecurity. Securing data in transit should be a top priority, not an afterthought.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Protect your data on the move — because it’s not just about knowing who’s trying to access it, it’s about ensuring that no one unauthorized ever can.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;By emphasizing the proactive protection of data in transit, businesses can ensure that sensitive information stays secure and continues to build customer trust.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/contact/"&gt;Contact us&lt;/a&gt; to find out how Certes DPRM protects your data in transit, ensuring sensitive information stays secure and protected from unauthorised access.&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt;
     &lt;strong style="color: #002060; font-family: Inter, -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; font-size: inherit; background-color: transparent;"&gt;Why Protecting Data in Transit Should Be Your Top Priority – Not Just Monitoring Network Activity&lt;/strong&gt;
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In seeking to protect valuable, sensitive information that all businesses maintain, many organizations prioritize network activity monitoring as their primary line of defense against cyber threats. While monitoring is important, it’s not enough on its own. One of the most overlooked but critical aspects of security is protecting data in transit — the data that moves between devices, networks, or cloud services.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In this blog post, we’ll explain why focusing on securing data in transit is essential and how it can protect your business from sophisticated cyber threats. We’ll also highlight how data protection through quantum cryoptography and security best practices can give you peace of mind that monitoring alone can’t provide.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;The Growing Threat to Data in Transit&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;When data is transmitted between different points (like between your company’s internal network and an external cloud server), it’s particularly vulnerable to attacks. This stage of data movement is known as data in transit or data in motion. Hackers constantly look for opportunities to intercept this data during transmission, hoping to steal, manipulate, or exploit it for malicious purposes.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Common threats to data in transit include:&lt;/span&gt;&lt;/p&gt; 
       &lt;ul&gt; 
        &lt;li&gt;&lt;strong&gt;Man-in-the-middle (MITM) attacks&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Hackers position themselves between two communicating parties to intercept and even alter the data being sent.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Eavesdropping&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Cybercriminals can listen in on unencrypted communications, capturing sensitive information like passwords, financial data, or personal details.&lt;/span&gt;&lt;/li&gt; 
        &lt;li&gt;&lt;strong&gt;Packet sniffing&lt;/strong&gt;&lt;span style="font-weight: 400;"&gt;: Attackers use special tools to capture and analyze data packets as they travel across networks, which can expose confidential data.&lt;/span&gt;&lt;/li&gt; 
       &lt;/ul&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;While monitoring network activity helps detect these kinds of attacks after they happen, it doesn’t prevent them. This is where the focus on securing data in transit comes into play.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Why Protecting Data in Transit Matters More Than You Think&lt;/strong&gt;&lt;/h2&gt; 
       &lt;ol&gt; 
        &lt;li&gt;&lt;strong&gt;Prevention is Better Than Detection&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Monitoring network traffic helps identify suspicious activity, but it’s reactive. By the time a threat is detected, the damage may already be done. On the other hand, protecting data in transit with strong quantum based encryption actively prevents hackers from being able to read or exploit sensitive information, even if they manage to intercept it.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Imagine sending an unencrypted email that contains your company’s financial data. If a hacker intercepts that communication, they can read it easily. Now, if that email is protected by strong cryptography and a key controlled by the customer, even if it’s intercepted, the hacker will be unable to decipher the information.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="2"&gt; 
        &lt;li&gt;&lt;strong&gt;Comply with Regulations and Standards&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Protecting data in transit is often a regulatory requirement. Many data protection regulations, such as GDPR, HIPAA, and PCI DSS, require businesses to encrypt sensitive data during transmission. Non-compliance can result in heavy fines and penalties, not to mention the loss of customer trust.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;For example, Payment Card Industry Data Security Standard (PCI DSS) requires credit card data transmitted over public networks to be encrypted. Simply monitoring your network won’t meet this standard, but encrypting your data in transit will.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="3"&gt; 
        &lt;li&gt;&lt;strong&gt;Guard Against Man-in-the-Middle (MITM) Attacks&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;MITM attacks can happen on any network, especially unsecured ones like public Wi-Fi. In these attacks, an attacker intercepts the data being sent between a sender and receiver, without either party knowing. They can steal login credentials, personal information, or other sensitive data. Protecting data in transit using end-to-end encryption can prevent attackers from accessing or tampering with your data, even if they manage to intercept it.&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="4"&gt; 
        &lt;li&gt;&lt;strong&gt;Secure Communication with Cloud Services&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With more businesses moving their operations to the cloud, ensuring secure communication between local systems and cloud services is vital. Data traveling to and from the cloud needs strong encryption to prevent exposure during transmission.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Without encrypting data in transit, your sensitive information could be intercepted at various points on its journey to the cloud provider.&lt;/span&gt;&lt;span style="font-weight: 400;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
       &lt;ol start="5"&gt; 
        &lt;li&gt;&lt;strong&gt;Prevent Unauthorized Data Modification&lt;/strong&gt;&lt;/li&gt; 
       &lt;/ol&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Not only can attackers steal data in transit, but they can also modify it. Imagine a scenario where an attacker intercepts and changes a file during transmission, potentially causing irreversible damage or confusion.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Encryption protects against unauthorized data modification by ensuring the data’s integrity. This is particularly important when used in conjunction with immutable backup solutions – the backup is only as good as the data it receives, if that data is tampered with then the backup is useless.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;How to Effectively Protect Data in Transit&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;To safeguard data in transit, you need to take proactive steps. Start from the assumption that your data will be the target of an attack and plan accordingly. A solution such as &lt;a href="https://certes.ai/dprm/"&gt;Certes DPRM&lt;/a&gt; (Data Protection and Risk Mitigation) is focused on protecting the data in transit, it does this in a way that is transparent to other network devices and services. The data is protected using quantum based techniques and includes key material unique to the customer that is changed per data flow every hour. The result is a data set that is only available to the customer and their intended recipient and no one else – no service provider, no network vendor and certainly no attacker.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Don’t Just Monitor, Secure Your Data&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;While monitoring network activity is an essential part of a strong security posture, it’s only one piece of the puzzle. Protecting data in transit is proactive, ensuring that your sensitive information remains safe even if it’s intercepted by malicious actors. By adopting Certes DPRM, and best practices, you can prevent many common cyberattacks and keep your business safe.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Remember, prevention is key in cybersecurity. Securing data in transit should be a top priority, not an afterthought.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Protect your data on the move — because it’s not just about knowing who’s trying to access it, it’s about ensuring that no one unauthorized ever can.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;By emphasizing the proactive protection of data in transit, businesses can ensure that sensitive information stays secure and continues to build customer trust.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;a href="https://certes.ai/contact/"&gt;Contact us&lt;/a&gt; to find out how Certes DPRM protects your data in transit, ensuring sensitive information stays secure and protected from unauthorised access.&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2024%2F10%2F03%2Fprotecting-data-in-transit&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:42 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2024/10/03/protecting-data-in-transit</guid>
      <dc:date>2026-03-12T12:09:42Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Rethinking Cybersecurity in Critical Infrastructure - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2024/09/13/rethinking-cybersecurity-critical-infrastructure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2024/09/13/rethinking-cybersecurity-critical-infrastructure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/Cloud-Storage-Blog-Thumbnail-2.png" alt="Rethinking Cybersecurity in Critical Infrastructure - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt; 
     &lt;strong style="color: #002060; font-family: Inter, -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; font-size: inherit; background-color: transparent;"&gt;Rethinking Cybersecurity in Critical Infrastructure&lt;/strong&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As the rate of cyber attacks worldwide continues to increase, the energy sector remains a prime target for attackers seeking to disrupt global economies. Recent examples, such as the Halliburton incident, highlight how criminals can exploit vulnerabilities that persist in systems, like Active Directory (AD) – underscoring the urgent need for a shift in how we approach cybersecurity for critical infrastructure.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Halliburton attack: a wake-up call for the industry&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The attack on Halliburton in August 2024 forced the company to take drastic measures, including shutting down some internal systems to prevent further unauthorized access. While the specifics of the attack remain under wraps, the potential compromise of core systems, like Active Directory (AD), could have led to significant operational disruptions. This incident is not just a concern for Halliburton but a clear signal to the entire energy sector – and other critical infrastructure industries – that they must move away from relying solely on traditional perimeter-based security measures that have repeatedly proven inadequate against sophisticated cyber threats.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;The role of Active Directory and the ZeroLogon exploit&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The Halliburton attack is part of a troubling trend in cyberattacks on critical infrastructure that reveal a broader industry crisis where vulnerabilities in systems like AD can lead to catastrophic outcomes. Once AD is compromised, it can grant attackers access to critical resources across the network, potentially leading to devastating consequences. By decrypting the AD database and creating their own superuser accounts, attackers can roam as they please throughout the network – a technique known as ‘living off the land’.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Using existing tools and legitimate processes for malicious activities without the need for malware or external tools, attackers can blend seamlessly into normal network traffic. Such a stealth approach means that attackers can remain undetected by traditional security measures.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;One particularly concerning exploit is ZeroLogon, a vulnerability in the Microsoft Netlogon Remote Protocol. This flaw allows attackers to manipulate authentication processes and gain control over an entire Active Directory environment. Exploits like ZeroLogon can result in attackers taking over all systems within a domain, enabling them to deploy ransomware, steal sensitive data, or even halt operations entirely.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Proactive defense: moving beyond traditional security&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With high-profile examples of critical infrastructure attacks being all too frequent, it’s clear that traditional network security measures are insufficient in protecting against sophisticated cyber threats. To effectively safeguard critical infrastructure, organizations must adopt a proactive, multi-layered defense strategy that focuses on securing and segmenting key systems like Active Directory.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This includes implementing solutions like &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes Data Protection and Risk Mitigation (DPRM)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; that &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;deliver a robust defense against exploits like ZeroLogon through a combination of granular security controls, including &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;strict data segmentation, &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;quantum-based cryptography for data in transit, strict policy enforcement, and real-time monitoring. This combination creates a robust defense that minimizes the risk of critical exploits compromising the AD environment.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As cyber threats continue to evolve, so must our approach to defending against them. By adopting proactive measures like DPRM, organizations can protect their most critical assets and contribute to the overall security of the industry.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;&lt;a href="https://certes.ai/contact/"&gt;Contact us&lt;/a&gt; to find out more about how Certes DPRM can strengthen your data security and protect your Active Directory against external threats.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt; 
    &lt;div class="stretch"&gt;
     &lt;strong style="color: #002060; font-family: Inter, -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; font-size: inherit; background-color: transparent;"&gt;Rethinking Cybersecurity in Critical Infrastructure&lt;/strong&gt;
    &lt;/div&gt; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 40px 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As the rate of cyber attacks worldwide continues to increase, the energy sector remains a prime target for attackers seeking to disrupt global economies. Recent examples, such as the Halliburton incident, highlight how criminals can exploit vulnerabilities that persist in systems, like Active Directory (AD) – underscoring the urgent need for a shift in how we approach cybersecurity for critical infrastructure.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Halliburton attack: a wake-up call for the industry&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The attack on Halliburton in August 2024 forced the company to take drastic measures, including shutting down some internal systems to prevent further unauthorized access. While the specifics of the attack remain under wraps, the potential compromise of core systems, like Active Directory (AD), could have led to significant operational disruptions. This incident is not just a concern for Halliburton but a clear signal to the entire energy sector – and other critical infrastructure industries – that they must move away from relying solely on traditional perimeter-based security measures that have repeatedly proven inadequate against sophisticated cyber threats.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;The role of Active Directory and the ZeroLogon exploit&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The Halliburton attack is part of a troubling trend in cyberattacks on critical infrastructure that reveal a broader industry crisis where vulnerabilities in systems like AD can lead to catastrophic outcomes. Once AD is compromised, it can grant attackers access to critical resources across the network, potentially leading to devastating consequences. By decrypting the AD database and creating their own superuser accounts, attackers can roam as they please throughout the network – a technique known as ‘living off the land’.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Using existing tools and legitimate processes for malicious activities without the need for malware or external tools, attackers can blend seamlessly into normal network traffic. Such a stealth approach means that attackers can remain undetected by traditional security measures.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;One particularly concerning exploit is ZeroLogon, a vulnerability in the Microsoft Netlogon Remote Protocol. This flaw allows attackers to manipulate authentication processes and gain control over an entire Active Directory environment. Exploits like ZeroLogon can result in attackers taking over all systems within a domain, enabling them to deploy ransomware, steal sensitive data, or even halt operations entirely.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;span style="font-size: 14pt;"&gt;&lt;strong&gt;Proactive defense: moving beyond traditional security&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With high-profile examples of critical infrastructure attacks being all too frequent, it’s clear that traditional network security measures are insufficient in protecting against sophisticated cyber threats. To effectively safeguard critical infrastructure, organizations must adopt a proactive, multi-layered defense strategy that focuses on securing and segmenting key systems like Active Directory.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This includes implementing solutions like &lt;/span&gt;&lt;a href="https://certes.ai/dprm/"&gt;&lt;span style="font-weight: 400;"&gt;Certes Data Protection and Risk Mitigation (DPRM)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; that &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;deliver a robust defense against exploits like ZeroLogon through a combination of granular security controls, including &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;strict data segmentation, &lt;/span&gt;&lt;span style="font-weight: 400;"&gt;quantum-based cryptography for data in transit, strict policy enforcement, and real-time monitoring. This combination creates a robust defense that minimizes the risk of critical exploits compromising the AD environment.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;As cyber threats continue to evolve, so must our approach to defending against them. By adopting proactive measures like DPRM, organizations can protect their most critical assets and contribute to the overall security of the industry.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;&lt;a href="https://certes.ai/contact/"&gt;Contact us&lt;/a&gt; to find out more about how Certes DPRM can strengthen your data security and protect your Active Directory against external threats.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2024%2F09%2F13%2Frethinking-cybersecurity-critical-infrastructure&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:41 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2024/09/13/rethinking-cybersecurity-critical-infrastructure</guid>
      <dc:date>2026-03-12T12:09:41Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Meta’s $1.3 billion GDPR Fine: Lessons in Data Protection - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2023/10/23/meta-gdpr-fine-lessons-in-data-protection</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2023/10/23/meta-gdpr-fine-lessons-in-data-protection" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/Certes-Meta-Breach-Blog-Thumbnail-1-1.png" alt="Meta’s $1.3 billion GDPR Fine: Lessons in Data Protection - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In May 2023, we witnessed Meta incur a staggering &lt;/span&gt;&lt;a href="https://www.nytimes.com/2023/05/22/business/meta-facebook-eu-privacy-fine.html#:~:text=Meta%20on%20Monday%20was%20fined,European%20Union%20data%20protection%20rules."&gt;&lt;span style="font-weight: 400;"&gt;$1.3 billion&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; GDPR fine, making it the largest-ever fine imposed by the European Union. This substantial penalty resulted from Meta’s violation of EU privacy laws, specifically related to the transfer of Facebook user data to U.S. servers.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This fine serves as a strong reminder to other businesses the importance of strict user data protection and emphasises regulatory bodies’ commitment to enforcing corporate compliance.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Below, we delve further into the concept of data sovereignty and the challenges faced by companies like Meta in protecting user data.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;&lt;strong&gt;The Challenges of Data Sovereignty&lt;/strong&gt;&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With increased global data protection efforts, data sovereignty becomes more important. Handling, preserving, and transferring data across borders has grown more complex, especially with widespread cloud storage and international data management. This complexity is magnified for organisations relying on Managed Service Providers (MSPs) for infrastructure needs, as accountability is shared between data owners and data handlers (MSPs) in case of data breaches. &lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Growing Value of Personal Data&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The value of our personal data has surged with the rise of social media and online activities like banking. Our data, once underestimated, is now an invaluable asset intertwined with our lives, but it does carry risks like identity theft.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Organisations handling personal data must recognise their duty to protect it, as GDPR regulations hold data owners accountable, regardless of its location or processing and regulators are becoming increasingly stringent on how the data is being handled. The responsibility to secure this asset is paramount.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Data-centric Security&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Traditional network security has heavily relied on perimeter protection, sometimes at the expense of neglecting vulnerabilities. Yet, the ongoing series of breaches and increasing regulatory pressure raises concerns about this approach.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Switching to data-centric security, which emphasises data protection instead of relying solely on perimeter measures like firewalls and access controls, can help avoid GDPR violations..&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The Meta breach highlights the need to go beyond networking monitoring and analytics for spotting data issues, clarifying that the root cause is data-related, not a network problem.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;How Certes Can Help Protect Your Data&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Organisations can enhance their data protection by adopting a solution such as the &lt;/span&gt;&lt;a href="https://certesnetworks.com/certes-layer-4/?__hstc=61884019.3b877041bdf55426b1c989fbfafac864.1772624791607.1772624791607.1772624791607.1&amp;amp;__hssc=61884019.36.1772624791607&amp;amp;__hsfp=8975bd765f1e9b75a1346a247b97f22e"&gt;&lt;span style="font-weight: 400;"&gt;Certes Layer 4 Solution&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;. With this approach, security is wrapped around the data itself, separate from the network security, and encryption mechanisms are implemented to ensure that Personally Identifiable Information (PII) is only visible to the intended recipients. This way, organisations can establish a form of virtual data sovereignty, eliminating concerns related to geographic boundaries and granting them greater freedom and control.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Lessons for GDPR Compliance&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Companies can learn valuable lessons from incidents like the Meta breach. The key takeaway is a shift in perspective: companies must recognise that, as data owners, they bear full responsibility for data throughout its lifecycle, regardless of its location. Assigning responsibility to service providers or the cloud isn’t enough in the eyes of regulators.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The Meta breach serves as a clear example of the challenge posed by cross-border data handling and reliance on Managed Service Providers. It underscores the significance of personal data and the obligation to safeguard it, regardless of its location.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Want to find out more about navigating data sovereignty? Check out our latest white paper &lt;/span&gt;&lt;a href="https://certesnetworks.com/wp-content/uploads/2023/10/CN-Meta-Breach-White-Paper.pdf?__hstc=61884019.3b877041bdf55426b1c989fbfafac864.1772624791607.1772624791607.1772624791607.1&amp;amp;__hssc=61884019.36.1772624791607&amp;amp;__hsfp=8975bd765f1e9b75a1346a247b97f22e"&gt;&lt;span style="font-weight: 400;"&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;In May 2023, we witnessed Meta incur a staggering &lt;/span&gt;&lt;a href="https://www.nytimes.com/2023/05/22/business/meta-facebook-eu-privacy-fine.html#:~:text=Meta%20on%20Monday%20was%20fined,European%20Union%20data%20protection%20rules."&gt;&lt;span style="font-weight: 400;"&gt;$1.3 billion&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt; GDPR fine, making it the largest-ever fine imposed by the European Union. This substantial penalty resulted from Meta’s violation of EU privacy laws, specifically related to the transfer of Facebook user data to U.S. servers.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;This fine serves as a strong reminder to other businesses the importance of strict user data protection and emphasises regulatory bodies’ commitment to enforcing corporate compliance.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Below, we delve further into the concept of data sovereignty and the challenges faced by companies like Meta in protecting user data.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;&lt;strong&gt;The Challenges of Data Sovereignty&lt;/strong&gt;&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;With increased global data protection efforts, data sovereignty becomes more important. Handling, preserving, and transferring data across borders has grown more complex, especially with widespread cloud storage and international data management. This complexity is magnified for organisations relying on Managed Service Providers (MSPs) for infrastructure needs, as accountability is shared between data owners and data handlers (MSPs) in case of data breaches. &lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Growing Value of Personal Data&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The value of our personal data has surged with the rise of social media and online activities like banking. Our data, once underestimated, is now an invaluable asset intertwined with our lives, but it does carry risks like identity theft.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Organisations handling personal data must recognise their duty to protect it, as GDPR regulations hold data owners accountable, regardless of its location or processing and regulators are becoming increasingly stringent on how the data is being handled. The responsibility to secure this asset is paramount.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Data-centric Security&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Traditional network security has heavily relied on perimeter protection, sometimes at the expense of neglecting vulnerabilities. Yet, the ongoing series of breaches and increasing regulatory pressure raises concerns about this approach.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Switching to data-centric security, which emphasises data protection instead of relying solely on perimeter measures like firewalls and access controls, can help avoid GDPR violations..&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The Meta breach highlights the need to go beyond networking monitoring and analytics for spotting data issues, clarifying that the root cause is data-related, not a network problem.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;How Certes Can Help Protect Your Data&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Organisations can enhance their data protection by adopting a solution such as the &lt;/span&gt;&lt;a href="https://certesnetworks.com/certes-layer-4/?__hstc=61884019.3b877041bdf55426b1c989fbfafac864.1772624791607.1772624791607.1772624791607.1&amp;amp;__hssc=61884019.36.1772624791607&amp;amp;__hsfp=8975bd765f1e9b75a1346a247b97f22e"&gt;&lt;span style="font-weight: 400;"&gt;Certes Layer 4 Solution&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;. With this approach, security is wrapped around the data itself, separate from the network security, and encryption mechanisms are implemented to ensure that Personally Identifiable Information (PII) is only visible to the intended recipients. This way, organisations can establish a form of virtual data sovereignty, eliminating concerns related to geographic boundaries and granting them greater freedom and control.&lt;/span&gt;&lt;/p&gt; 
       &lt;h2&gt;&lt;strong&gt;Lessons for GDPR Compliance&lt;/strong&gt;&lt;/h2&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Companies can learn valuable lessons from incidents like the Meta breach. The key takeaway is a shift in perspective: companies must recognise that, as data owners, they bear full responsibility for data throughout its lifecycle, regardless of its location. Assigning responsibility to service providers or the cloud isn’t enough in the eyes of regulators.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;The Meta breach serves as a clear example of the challenge posed by cross-border data handling and reliance on Managed Service Providers. It underscores the significance of personal data and the obligation to safeguard it, regardless of its location.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-weight: 400;"&gt;Want to find out more about navigating data sovereignty? Check out our latest white paper &lt;/span&gt;&lt;a href="https://certesnetworks.com/wp-content/uploads/2023/10/CN-Meta-Breach-White-Paper.pdf?__hstc=61884019.3b877041bdf55426b1c989fbfafac864.1772624791607.1772624791607.1772624791607.1&amp;amp;__hssc=61884019.36.1772624791607&amp;amp;__hsfp=8975bd765f1e9b75a1346a247b97f22e"&gt;&lt;span style="font-weight: 400;"&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: 400;"&gt;.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2023%2F10%2F23%2Fmeta-gdpr-fine-lessons-in-data-protection&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:41 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2023/10/23/meta-gdpr-fine-lessons-in-data-protection</guid>
      <dc:date>2026-03-12T12:09:41Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
    <item>
      <title>Do We No Longer Care About Data Breaches? - Certes</title>
      <link>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/11/do-we-no-longer-care-about-data-breaches</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://147376311.hs-sites-eu1.com/certes-blog/2019/09/11/do-we-no-longer-care-about-data-breaches" title="" class="hs-featured-image-link"&gt; &lt;img src="https://147376311.hs-sites-eu1.com/hubfs/Imported_Blog_Media/CN_Blog-Data-Breaches-BLOG.png" alt="Do We No Longer Care About Data Breaches? - Certes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
     &amp;nbsp; 
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Data breaches comprised of large volumes of sensitive information being compromised, stolen, or held for ransom not almost seems commonplace today but the repercussions may not be widely understood by the broader public.&amp;nbsp; And, as I talk to the average person on the street, most are not even aware that large data breaches have happened compromising their personal data and potential financial security.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;The year 2019 is shaping up to be a landmark one for data breaches as it has seen over 3,800 breaches which is a 50% greater increase over the last four years, according to a &lt;a href="https://pages.riskbasedsecurity.com/2019-midyear-data-breach-quickview-report"&gt;report published by Risk Based Security&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Despite cybersecurity concerns, 89% of breaches are the result of outside attacks and primarily due to the failure of organizations to properly handle or secure information resulting in over 3.2 billion records being exposed as of August 2019.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Risk Based Security also points to the dangers of placing sensitive data in the hands of third parties, naming the&amp;nbsp;&lt;a href="https://www.zdnet.com/article/amca-data-breach-has-now-gone-over-the-20-million-mark/"&gt;American Medical Collection Agency (AMCA) breach&lt;/a&gt;, in which “hackers infiltrated AMCA’s network and pilfered over 22 million debtors’ records including data such as names, addresses, dates of birth, Social Security numbers and financial details” as a critical event. “These breaches can be more difficult to manage given the multiple parties involved and can also have more damaging consequences for the individuals whose data is exposed in the event,” the report said, noting that the breach has severe consequences for AMCA, as the company&amp;nbsp;“was&amp;nbsp;&lt;a href="https://www.zdnet.com/article/medical-debt-collector-amca-files-for-bankruptcy-protection-after-data-breach/"&gt;forced into filing for bankruptcy protection&lt;/a&gt;&amp;nbsp;a mere 2 weeks after news of the breach made headlines.”&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Moreover, ransomware attacks on businesses are up 365% in 2019 with cybercriminals targeting businesses instead of consumers hoping for the “big payout.”&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;“Cybercriminals are searching for higher returns on their investment, and they can reap serious benefits from ransoming organizations over individuals, who might yield, at best, a few personal files that could be used for extortion or identity theft,” the report stated. “Encrypting sensitive proprietary data on any number of endpoints allows cybercriminals to put forth much larger ransom demands while gaining an exponentially higher chance of getting paid.”&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As breaches, ransomware, phishing attacks and the like become all too common, there can be no more motivation than these recurring events to protect and encrypt data.&amp;nbsp;&amp;nbsp; With all of the cybersecurity technology and tools available today, why are these attacks becoming more prevalent and frequent?&amp;nbsp;Are cybercriminals becoming more sophisticated or are they simply banking on the fact that most organizations think their data is safe when indeed it is not?&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Any network can be hacked, but encrypting sensitive data, defining strong policies between applications and end-users, and enforcing these policies through enhanced visibility, lessens the likelihood that in the event of a breach, it can either be detected much earlier and/or the data hackers breach will be unreadable and useless.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="content-main"&gt; 
 &lt;div class="site-content"&gt; 
  &lt;div&gt; 
   &lt;div class="page-banner"&gt;
    &amp;nbsp;
   &lt;/div&gt; 
   &lt;div class="container" style="padding: 40px 0 0 0;"&gt; 
    &lt;div class="row"&gt; 
     &lt;div class="col-xs-12 col-sm-8 col-md-9"&gt; 
      &lt;div class="blog-txt"&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Data breaches comprised of large volumes of sensitive information being compromised, stolen, or held for ransom not almost seems commonplace today but the repercussions may not be widely understood by the broader public.&amp;nbsp; And, as I talk to the average person on the street, most are not even aware that large data breaches have happened compromising their personal data and potential financial security.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;The year 2019 is shaping up to be a landmark one for data breaches as it has seen over 3,800 breaches which is a 50% greater increase over the last four years, according to a &lt;a href="https://pages.riskbasedsecurity.com/2019-midyear-data-breach-quickview-report"&gt;report published by Risk Based Security&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Despite cybersecurity concerns, 89% of breaches are the result of outside attacks and primarily due to the failure of organizations to properly handle or secure information resulting in over 3.2 billion records being exposed as of August 2019.&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Risk Based Security also points to the dangers of placing sensitive data in the hands of third parties, naming the&amp;nbsp;&lt;a href="https://www.zdnet.com/article/amca-data-breach-has-now-gone-over-the-20-million-mark/"&gt;American Medical Collection Agency (AMCA) breach&lt;/a&gt;, in which “hackers infiltrated AMCA’s network and pilfered over 22 million debtors’ records including data such as names, addresses, dates of birth, Social Security numbers and financial details” as a critical event. “These breaches can be more difficult to manage given the multiple parties involved and can also have more damaging consequences for the individuals whose data is exposed in the event,” the report said, noting that the breach has severe consequences for AMCA, as the company&amp;nbsp;“was&amp;nbsp;&lt;a href="https://www.zdnet.com/article/medical-debt-collector-amca-files-for-bankruptcy-protection-after-data-breach/"&gt;forced into filing for bankruptcy protection&lt;/a&gt;&amp;nbsp;a mere 2 weeks after news of the breach made headlines.”&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Moreover, ransomware attacks on businesses are up 365% in 2019 with cybercriminals targeting businesses instead of consumers hoping for the “big payout.”&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;“Cybercriminals are searching for higher returns on their investment, and they can reap serious benefits from ransoming organizations over individuals, who might yield, at best, a few personal files that could be used for extortion or identity theft,” the report stated. “Encrypting sensitive proprietary data on any number of endpoints allows cybercriminals to put forth much larger ransom demands while gaining an exponentially higher chance of getting paid.”&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;As breaches, ransomware, phishing attacks and the like become all too common, there can be no more motivation than these recurring events to protect and encrypt data.&amp;nbsp;&amp;nbsp; With all of the cybersecurity technology and tools available today, why are these attacks becoming more prevalent and frequent?&amp;nbsp;Are cybercriminals becoming more sophisticated or are they simply banking on the fact that most organizations think their data is safe when indeed it is not?&lt;/span&gt;&lt;/p&gt; 
       &lt;p&gt;&lt;span style="font-size: 14pt;"&gt;Any network can be hacked, but encrypting sensitive data, defining strong policies between applications and end-users, and enforcing these policies through enhanced visibility, lessens the likelihood that in the event of a breach, it can either be detected much earlier and/or the data hackers breach will be unreadable and useless.&lt;/span&gt;&lt;/p&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;   
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147376311&amp;amp;k=14&amp;amp;r=https%3A%2F%2F147376311.hs-sites-eu1.com%2Fcertes-blog%2F2019%2F09%2F11%2Fdo-we-no-longer-care-about-data-breaches&amp;amp;bu=https%253A%252F%252F147376311.hs-sites-eu1.com%252Fcertes-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:09:40 GMT</pubDate>
      <guid>https://147376311.hs-sites-eu1.com/certes-blog/2019/09/11/do-we-no-longer-care-about-data-breaches</guid>
      <dc:date>2026-03-12T12:09:40Z</dc:date>
      <dc:creator>Certes Networks</dc:creator>
    </item>
  </channel>
</rss>
