top of page

2022 Cyber Predictions: Searchable Encryption Is Practical

This is part of our 2022 cybersecurity predictions series.

Vaultree executives weigh-in on cybersecurity in 2022.

Ryan Lasmaili, co-founder, Vaultree

“The early adopters of encryption came from highly regulated industries, including healthcare, law enforcement and finance. Now, encryption adoption will rise across industries as organizations strive to minimize any data privacy concerns due to the storage of confidential data. There are strict rules regarding data privacy and security, and encryption is the foundational technology for that.

If data is encrypted at rest, we solve most of the problems of data breaches, as encrypted data is useless to criminals. The ideal scenario would be to move to encryption schemes such as searchable encryption, which would allow the data model to ‘learn’ from the data. Searchable encryption is practical and could solve many of the challenges regarding data privacy.”

Maxim Dressler, co-founder, Vaultree

“Even well-managed SIEM systems struggle to provide an overview of what is occurring in the network at any time. Zero trust, with its foundation in the cloud, offers a holistic solution to provide a secure environment for office-based and remote workers alike. The need for a zero-trust security model has arisen in part because enterprises no longer tend to host data in-house but rather through a variety of platforms and services that reside both on- and off-premises. Zero trust works from the premise that no user, internal or external to the network, can be trusted by default. This identity-driven focus brings security and networked convergence to organizations. This alone makes it strategically important for technology to allow companies to grow their networks more safely.”

Tilo Weigandt, co-founder, Vaultree

“Internal security teams are the new thing. There are so many responsibilities related just to data security that it makes sense for the majority of companies to have a CISO.

Cybersecurity training should be mandatory, as individuals are often the most vulnerable targets and also the first line of defense. This goes for senior IT management staff as well, because they need a bigger-picture view of how cybersecurity is an organization-wide risk. They must understand the legal and regulatory importance of cyber risks -and, therefore, their actions – in the context of their own organization.”



bottom of page