It is with both gratitude and sadness that we announce the retirement of Lark Allen as Executive Vice President of Business Development at Wave.
A longtime advocate for Trusted Computing throughout his career, Lark worked closely with leading players in the storage space to promote market acceptance of self-encrypting drives built on industry standards. Through these partnerships, and because of Lark’s invaluable contributions, Wave has more enterprise SEDs under management today than any other ISV. Most recently, Lark spearheaded Wave’s entry into the mobile security space, as the company’s representative on the ARM Trust-Ready program and as a partner of the newly launched Trustonic venture committed to improving security standards on mobile devices. He also served as a member of the Storage Work Group within the Trusted Computing Group (where Wave is a founding member). Before joining Wave in 1998, Lark spent 30 years in executive management positions in sales, marketing and consulting at IBM.
Yesterday’s announcement of Trustonic, a new venture from ARM (the UK-based chip company), Gemalto and Giesecke & Devrient, signaled that industry was finally getting serious about the need for trust built into smart connected devices—just as more and more consumers and corporate users look to conduct commerce or financial transactions on their tablets or smartphones. Trustonic’s formation stands as a validation of the transformational role Trusted Computing will play in the mobile device security of tomorrow.
Wave is an official launch partner, and it’s fitting, as we’ve been one of the most strident advocates for a safer, more trusted computing environment for more than a decade now, since we introduced our EMBedded Application Security SYstem, or EMBASSY solution. EMBASSY included a chip that provided a programmable trusted execution environment (TEE) that securely ran ‘trustlets.’
Recent research has revealed that fewer than half of CIOs test cloud security systems and procedures. At the same time, the survey, conducted by risk consulting firm Protiviti, reported that 84 per cent of respondents were concerned about cyber security.
This reveals a contradiction: why do CIOs care about cyber security, and yet not exercise measures to ensure data safety within the cloud?
A report from the Office of Inspector General confirmed that the Veterans Affairs (VA) Department failed to make good on its hard drive encryption policy, installing and activating only 65,000 of the encryption licenses it bought since its widely publicized data breach in 2006. The breach involved records of 26.5 million active duty troops, veterans and their family members.
The 2006 incident made the VA the poster child for data breach and became the catalyst for new measures to protect Personally Identifiable Information (PII), as well as prompting a slew of laws and regulations in the US and Europe –and now expanding across the globe.
Enterprises are incorporating—and even promoting—the use of social networking applications such as Facebook, Twitter and LinkedIn as a key, if not primary, method for communicating and disseminating information. Indeed, social networking could one day supplant traditional email messaging—in large part owing to its instantaneous one-to-many dissemination feature.
Simultaneously, there’s been a trend to move information to the Cloud. It’s more cost-effective and accessible—but introduces the potential for data exposure, leakage and breach, due to the nascent state of cloud “security.”
It begs the question: What assurances does the enterprise have that documents containing intellectual property or personally identifiable data are actually safe in the Cloud?