nCipher Security stories
![Story image](../../../../../uploads/story/2020/04/07/preview_data_security_copy.webp)
Employee errors 'the most significant threat to personal data' - report
Wed, 8th Apr 2020
#
cybersecurity
#
personal security
#
cybersafety
Employee errors are now the leading threat to personal data, surpassing hacker attacks and malicious insiders, according to an nCipher Security report.
![Story image](../../../../../uploads/story/2020/02/11/preview_handshake8.webp)
DNA Connect signs on as nCipher’s newest ANZ distributor
Tue, 11th Feb 2020
#
iot
#
multi-cloud
#
risk & compliance
DNA Connect has become nCipher Security’s newest distributor in Australia and New Zealand, enhancing data protection and cybersecurity offerings in the region.
![Story image](../../../../../uploads/story/2020/01/31/preview_cloud_services.webp)
nCipher introduces cloud-first architecture
Fri, 31st Jan 2020
#
cloud security
#
multi-cloud
#
cybersecurity
New web services APIs and container technology streamline integration of nShield HSMs with cloud environments.
![Story image](../../../../../uploads/story/2019/09/19/preview_cloud_security6.webp)
nCipher launches HSM-as-a-Service for organisations adopting cloud-first strategies
Thu, 19th Sep 2019
#
cloud security
#
multi-cloud
#
ncipher security
nShield-as-a-Service is ideal for cloud-first strategies, selective cloud migration, or adding HSM capacity to handle workload spikes.
![Story image](../../../../../uploads/story/2019/04/02/preview_enccryption.webp)
Organisations putting stronger focus on data encryption – report
Tue, 2nd Apr 2019
#
private cloud
#
encryption
#
risk & compliance
Cloud data protection requirements continue to drive encryption use, with encryption across both public and private cloud use cases growing over 2018 levels.
![Story image](../../../../../uploads/story/2019/02/20/preview_identity_and_access_management4.webp)
Venafi and nCipher Security partner on machine identity protection
Wed, 20th Feb 2019
#
partner programmes
#
iam
#
venafi
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.