Sign In
The CEO Views Small logos
  • Home
  • Technology
    Artificial Intelligence
    Big Data
    Block Chain
    BYOD
    Cloud
    Cyber Security
    Data Center
    Digital Transformation
    Enterprise Mobility
    Enterprise Software
    IOT
    IT Services
    Innovation
  • Platforms
    How IBM Maximo Is Revolutionizing Asset Management
    How IBM Maximo Is Revolutionizing Asset Management
    IBM
    7 Min Read
    Optimizing Resources: Oracle DBA Support Services for Efficient Database Management
    Oracle
    Oracle
    9 Min Read
    The New Google Algorithm Update for 2021
    google algorithm update 2021
    Google
    5 Min Read
    Oracle Cloud Platform Now Validated for India Stack
    Service Partner Horizontal
    Oracle
    3 Min Read
    Oracle and AT&T Enter into Strategic Agreement
    oracle
    Oracle
    3 Min Read
    Check out more:
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    Banking & Insurance
    Biotech
    Construction
    Education
    Financial Services
    Healthcare
    Manufacturing
    Mining
    Public Sector
    Retail
    Telecom
    Utilities
    Gaming
    Legal
  • Functions
    RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance
    Risma Systems
    ENTREPRENEUR VIEWSGDPR
    9 Min Read
    Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses
    Happiest Minds 1
    GDPR
    8 Min Read
    Gemserv: GDPR 2020 and Beyond
    Gemserv 1
    GDPR
    9 Min Read
    ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
    eccenca 1
    GDPR
    6 Min Read
    Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
    Boldon James 1
    GDPR
    8 Min Read
    Check out more:
    • GDPR
  • Magazines
  • Entrepreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
  • Events
Reading: Worldwide Data Losses Exceed Coronavirus Impact
Share
The CEO Views
Aa
  • Home
  • Magazines
  • Enterpreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Search
  • World’s Best Magazines
  • Technology
    • Artificial Intelligence
    • Big Data
    • Block Chain
    • BYOD
    • Cloud
    • Cyber Security
    • Data Center
    • Digital Transformation
    • Enterprise Mobility
    • Enterprise Software
    • IOT
    • IT Services
  • Platforms
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    • Banking & Insurance
    • Biotech
    • Construction
    • Education
    • Financial Services
    • Healthcare
    • Manufacturing
    • Mining
    • Public Sector
    • Retail
    • Telecom
    • Utilities
  • Functions
    • GDPR
  • Magazines
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
The CEO Views > Blog > Technology > Cyber Security > Worldwide Data Losses Exceed Coronavirus Impact
Cyber Security

Worldwide Data Losses Exceed Coronavirus Impact

The CEO Views
Last updated: 2024/03/11 at 1:20 AM
The CEO Views
Share
Sertainty 1
Sertainty 1

Some estimates place the value of all US data at $13T and $130T globally.  Monetary estimates alone cannot count the personal or corporate devastation when our data is exploited. Given the financial impact of the recent Corona Virus epidemic, one could easily imagine the effect of a global cyber storm by criminals or anarchists.  Even assuming a much more benign 1% annual global data loss, the impact would be $130B!

In 2009 our scientists at Sertainty dared to imagine scalable methods for making all data immune to exploitation by making it completely self-protecting. In 2020 we are even more excited because the demand has never been higher nor the consequences graver.  We have only begun to penetrate the banking, entertainment, health, and Federal markets as industry capitalize on the significance of our accomplishments.

As a nation, we hate to admit it, but despite enormous efforts and expense, corporate security boundaries are breached every day. The barbarians are inside the gates.  Cybersecurity vendors have given us comforting names like Zero Trust, Role-Based Access, and Privileged Identity Management, but none have stop data exfiltration or exploitation.  That means $B’s of cybersecurity investments fail every day to protect our data.

We founded Sertainty with a singular purpose; make data fully able to defend itself anywhere and for all time. I am proud to say we achieved that goal.  But like all revolutionary technologies, it begins with education.

Looking back ten years, it is kind of funny now, but we used to be dismissed as heretics. So were Steve Jobs, Bill Gates and Jeff Bezos. It is lonely being an industry leader, But little by little, we proved that the technology works, it is easy to deploy, and it is highly effective. I love watching the facial expression of prospective customers as they realize how disruptive we are, how affordable our technology is, and how much we can contribute to reducing their business risk. Their insurance companies and CFO’s like us too because dramatically improve their balance sheet.

Under the current paradigm, data does not know where it is, who is authorized to use it, or how to defend itself. Looking back at the Target, OPM, and Equifax data breaches, the root cause experts repeatedly concluded that the attackers used phishing methods to gain entry and sophisticated obfuscation with sophisticated malware to steal the data. That was all true, but it wasn’t the root cause of the catastrophes. Not a single expert recognized that the root cause was a failure to immunize the data, and thus make it self-protecting.

Self-protecting does not mean encryption.  It means the data is physically empowered to take a progressive set of defensive measures that are configured by the data owner.  Most people do not know that such a capability exists, which explains the expert’s misguided root cause conclusions.

For the first time in history, our personal or corporate data can be born protected and remain protected throughout its life. That means if left exposed on any device outside a secure network, self-aware and self-protecting data can defend itself without any external support.

The addressable market for this technology is unlimited because data is much more than files. Every digital communication, business application, digital device, threat intelligence platform, next-generation firewall, insider threat protection, or identity management solution would benefit from self-protecting data technology.  Regulatory compliance for GDPR, HIPPA, or other regulatory compliance solution also becomes trivial with self-protecting data technology.  Why? Because the data is self-aware and can automatically verify regulatory compliance on itself. Now that is low-cost compliance.

In most instances, CISO’s and CIO’s quickly realize that with Sertainty’s self-protecting data technology, encrypted networks, while appropriate, are no longer necessary.  Under this new paradigm, data is born protected and stays protected for its lifetime. The data has an awareness of where it is, who is trying to access it, and all the access controls imposed by the data owner.

Like all founders of technology startups, we know that revolutions do not come easily or often.  As the markets create new applications for our technology, we discover with them the potential benefits in our lives. Now we are told by businesses and consumers how reassuring it would be if our technology became ubiquitous across the IT domain. They imagine a time when it no longer matters who has their data.  Imagine how comforting that would be to your stockholders, customers, vendors, and partners.

It has been an exhilarating ride, and as CEO of Sertainty, I could not be more proud of our accomplishments.  Every CISO and CIO should be demanding their vendors embed self-protecting, self-aware data technology in future products.

Greg C. Taylor, CEO

Sertainty Corporation

greg.taylor@sertainty.com

www.sertainty.com

The CEO Views May 9, 2020
Share this Article
Facebook Twitter LinkedIn Email Copy Link
Previous Article EclecticIQ 2 EclecticIQ: Building Next-Gen Intelligence-Powered Cybersecurity
Next Article Stealth ISS Group 1 Stealth- ISS Group: Compliant Does not Equal Secure – Going the Extra Mile
Understanding Common Types of Business 1

Understanding Common Types of Business Disputes in Chicago: Overview and Case Examples

February 9, 2024
How to Use CRM Data to Enhance Email Marketing Performance
Digital Marketing

How to Use CRM Data to Enhance Email Marketing Performance

The CEO Views By The CEO Views March 24, 2025
Ascend Digital Solutions
ENTREPRENEUR VIEWS

ASCEND DIGITAL SOLUTIONS: Transforming the digital future of Africa

The CEO Views By The CEO Views February 23, 2024
How can businesses benefit from device management lockers
Micro Blog

How can businesses benefit from device management lockers?

The CEO Views By The CEO Views February 24, 2025
Mark Rees COO
Magazine

AI – Expanding Avenues to Cater Security Concerns

The CEO Views By The CEO Views April 13, 2022

Top 5 Resume Builders

July 1, 2025

Defending Theft Charges in Orlando: What to Expect

July 1, 2025

Legal Options for Those Accused of Drug Trafficking in West Palm Beach

July 1, 2025

Brand Identity Services: Building a Memorable Presence from Day One

July 1, 2025

You Might Also Like

When Every Second Counts Benchmarking Proxies for Real Time Price Intelligence
Cyber Security

When Every Second Counts: Benchmarking Proxies for Real-Time Price Intelligence

5 Min Read
Why Online Cybersecurity Training Is Essential in 2025
Cyber Security

Why Online Cybersecurity Training Is Essential in 2025

5 Min Read
Are Proxy Servers Safe to Use
Cyber Security

Are Proxy Servers Safe to Use? Comparing with VPN Alternatives

7 Min Read
How Cyber Security Measures are Evolving in Online Gaming
Cyber Security

How Cyber Security Measures are Evolving in Online Gaming

4 Min Read
Small logos Small logos

© 2025 All rights reserved. The CEO Views

  • About Us
  • Privacy Policy
  • Advertise with us
  • Reprints and Permissions
  • Business Magazines
  • Contact
Reading: Worldwide Data Losses Exceed Coronavirus Impact
Share

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?