Sign In
The CEO Views Small logos
  • Home
  • Technology
    Artificial Intelligence
    Big Data
    Block Chain
    BYOD
    Cloud
    Cyber Security
    Data Center
    Digital Transformation
    Enterprise Mobility
    Enterprise Software
    IOT
    IT Services
    Innovation
  • Platforms
    How IBM Maximo Is Revolutionizing Asset Management
    How IBM Maximo Is Revolutionizing Asset Management
    IBM
    7 Min Read
    Optimizing Resources: Oracle DBA Support Services for Efficient Database Management
    Oracle
    Oracle
    9 Min Read
    The New Google Algorithm Update for 2021
    google algorithm update 2021
    Google
    5 Min Read
    Oracle Cloud Platform Now Validated for India Stack
    Service Partner Horizontal
    Oracle
    3 Min Read
    Oracle and AT&T Enter into Strategic Agreement
    oracle
    Oracle
    3 Min Read
    Check out more:
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    Banking & Insurance
    Biotech
    Construction
    Education
    Financial Services
    Healthcare
    Manufacturing
    Mining
    Public Sector
    Retail
    Telecom
    Utilities
    Gaming
    Legal
  • Functions
    RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance
    Risma Systems
    ENTREPRENEUR VIEWSGDPR
    9 Min Read
    Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses
    Happiest Minds 1
    GDPR
    8 Min Read
    Gemserv: GDPR 2020 and Beyond
    Gemserv 1
    GDPR
    9 Min Read
    ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
    eccenca 1
    GDPR
    6 Min Read
    Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
    Boldon James 1
    GDPR
    8 Min Read
    Check out more:
    • GDPR
  • Magazines
  • Entrepreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
  • Events
Reading: Worldwide Data Losses Exceed Coronavirus Impact
Share
The CEO Views
Aa
  • Home
  • Magazines
  • Enterpreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Search
  • World’s Best Magazines
  • Technology
    • Artificial Intelligence
    • Big Data
    • Block Chain
    • BYOD
    • Cloud
    • Cyber Security
    • Data Center
    • Digital Transformation
    • Enterprise Mobility
    • Enterprise Software
    • IOT
    • IT Services
  • Platforms
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    • Banking & Insurance
    • Biotech
    • Construction
    • Education
    • Financial Services
    • Healthcare
    • Manufacturing
    • Mining
    • Public Sector
    • Retail
    • Telecom
    • Utilities
  • Functions
    • GDPR
  • Magazines
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
The CEO Views > Blog > Technology > Cyber Security > Worldwide Data Losses Exceed Coronavirus Impact
Cyber Security

Worldwide Data Losses Exceed Coronavirus Impact

The CEO Views
Last updated: 2024/03/11 at 1:20 AM
The CEO Views
Share
Sertainty 1
Sertainty 1

Some estimates place the value of all US data at $13T and $130T globally.  Monetary estimates alone cannot count the personal or corporate devastation when our data is exploited. Given the financial impact of the recent Corona Virus epidemic, one could easily imagine the effect of a global cyber storm by criminals or anarchists.  Even assuming a much more benign 1% annual global data loss, the impact would be $130B!

In 2009 our scientists at Sertainty dared to imagine scalable methods for making all data immune to exploitation by making it completely self-protecting. In 2020 we are even more excited because the demand has never been higher nor the consequences graver.  We have only begun to penetrate the banking, entertainment, health, and Federal markets as industry capitalize on the significance of our accomplishments.

As a nation, we hate to admit it, but despite enormous efforts and expense, corporate security boundaries are breached every day. The barbarians are inside the gates.  Cybersecurity vendors have given us comforting names like Zero Trust, Role-Based Access, and Privileged Identity Management, but none have stop data exfiltration or exploitation.  That means $B’s of cybersecurity investments fail every day to protect our data.

We founded Sertainty with a singular purpose; make data fully able to defend itself anywhere and for all time. I am proud to say we achieved that goal.  But like all revolutionary technologies, it begins with education.

Looking back ten years, it is kind of funny now, but we used to be dismissed as heretics. So were Steve Jobs, Bill Gates and Jeff Bezos. It is lonely being an industry leader, But little by little, we proved that the technology works, it is easy to deploy, and it is highly effective. I love watching the facial expression of prospective customers as they realize how disruptive we are, how affordable our technology is, and how much we can contribute to reducing their business risk. Their insurance companies and CFO’s like us too because dramatically improve their balance sheet.

Under the current paradigm, data does not know where it is, who is authorized to use it, or how to defend itself. Looking back at the Target, OPM, and Equifax data breaches, the root cause experts repeatedly concluded that the attackers used phishing methods to gain entry and sophisticated obfuscation with sophisticated malware to steal the data. That was all true, but it wasn’t the root cause of the catastrophes. Not a single expert recognized that the root cause was a failure to immunize the data, and thus make it self-protecting.

Self-protecting does not mean encryption.  It means the data is physically empowered to take a progressive set of defensive measures that are configured by the data owner.  Most people do not know that such a capability exists, which explains the expert’s misguided root cause conclusions.

For the first time in history, our personal or corporate data can be born protected and remain protected throughout its life. That means if left exposed on any device outside a secure network, self-aware and self-protecting data can defend itself without any external support.

The addressable market for this technology is unlimited because data is much more than files. Every digital communication, business application, digital device, threat intelligence platform, next-generation firewall, insider threat protection, or identity management solution would benefit from self-protecting data technology.  Regulatory compliance for GDPR, HIPPA, or other regulatory compliance solution also becomes trivial with self-protecting data technology.  Why? Because the data is self-aware and can automatically verify regulatory compliance on itself. Now that is low-cost compliance.

In most instances, CISO’s and CIO’s quickly realize that with Sertainty’s self-protecting data technology, encrypted networks, while appropriate, are no longer necessary.  Under this new paradigm, data is born protected and stays protected for its lifetime. The data has an awareness of where it is, who is trying to access it, and all the access controls imposed by the data owner.

Like all founders of technology startups, we know that revolutions do not come easily or often.  As the markets create new applications for our technology, we discover with them the potential benefits in our lives. Now we are told by businesses and consumers how reassuring it would be if our technology became ubiquitous across the IT domain. They imagine a time when it no longer matters who has their data.  Imagine how comforting that would be to your stockholders, customers, vendors, and partners.

It has been an exhilarating ride, and as CEO of Sertainty, I could not be more proud of our accomplishments.  Every CISO and CIO should be demanding their vendors embed self-protecting, self-aware data technology in future products.

Greg C. Taylor, CEO

Sertainty Corporation

greg.taylor@sertainty.com

www.sertainty.com

The CEO Views May 9, 2020
Share this Article
Facebook Twitter LinkedIn Email Copy Link
Previous Article EclecticIQ 2 EclecticIQ: Building Next-Gen Intelligence-Powered Cybersecurity
Next Article Stealth ISS Group 1 Stealth- ISS Group: Compliant Does not Equal Secure – Going the Extra Mile
Best Healthcare App Development Services

Best Healthcare App Development Services to Build Your Next Digital Health Solution in 2025

July 15, 2025
Florida Hotel and Conference Center Title image
Press Release

Project Story: Florida Hotel and Conference Center

The CEO Views By The CEO Views February 15, 2024
Complete Overview of .NET Development in 2025
IT Services

Complete Overview of .NET Development in 2025

The CEO Views By The CEO Views June 30, 2025
Top 5 Oldest TV Game Shows That Shaped Modern Entertainment
Micro Blog

Top 5 Oldest TV Game Shows That Shaped Modern Entertainment

The CEO Views By The CEO Views October 16, 2024
Staying Safe While Betting on Sports Online A Comprehensive Guide
Micro Blog

Staying Safe While Betting on Sports Online: A Comprehensive Guide

The CEO Views By The CEO Views November 11, 2024

Harsh Weather Conditions Can Lead to Car Crashes

August 16, 2025

What’s the ROI of Penetration Testing for Growing Companies?

August 16, 2025

The Future of Pharmacy: Why Digital Health and eCommerce Are Reshaping the Industry

August 16, 2025

How to Play Pokies: A Complete Guide for Australian Gamblers

August 16, 2025

You Might Also Like

What’s the ROI of Penetration Testing for Growing Companies
Cyber Security

What’s the ROI of Penetration Testing for Growing Companies?

4 Min Read
The Hidden Cost of Cybersecurity Neglect How Weak Security Is Holding Your Business Back
Cyber Security

The Hidden Cost of Cybersecurity Neglect: How Weak Security Is Holding Your Business Back

7 Min Read
Top Features to Look for in an MSP Password Manager
Cyber Security

Top Features to Look for in an MSP Password Manager

5 Min Read
What Is a Proxy A Simple Guide for Everyday Users
Cyber Security

What Is a Proxy? A Simple Guide for Everyday Users

8 Min Read
Small logos Small logos

© 2025 All rights reserved. The CEO Views

  • About Us
  • Privacy Policy
  • Advertise with us
  • Reprints and Permissions
  • Business Magazines
  • Contact
Reading: Worldwide Data Losses Exceed Coronavirus Impact
Share

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?