Page 242 - Cyber Defense eMagazine September 2025
P. 242
and the data is exposed as clear text. Only continuous (homomorphic) encryption now available
in new Privacy Enhancing Technologies (PETs) continuously protect data. By eradicating data
loss, PETs can put an end to data breaches, data leaks, and the damage they cause. In doing
so, it can eliminate the damage to brand reputation and ensuing litigation associated with data
breaches, as well as regulatory reporting requirements. It not only helps organizations protect
their intellectual property, confidential information and trade secrets from competitors, foreign
adversaries and criminals – it preserves their brand value and bottom line.
In conclusion, perimeter-based cybersecurity solutions are like a moat around a castle. They may deter
and defend, but they do not stop hackers from getting into networks or people with legitimate credentials
from stealing data, plug security holes that leak data, or eliminate mistakes and misconfigurations of
settings. Many security breaches occur because employees are unaware of best practices in
cybersecurity or are careless in following them. Perhaps the single most important cybersecurity best
practice for businesses to follow today is to invest in a multi-layered defense strategy, also known as
“Defense in Depth.” This layering should include not just perimeter and Zero-Trust strategies, but also
secure data down at its source via continuous encryption now becoming commercially available. This
approach minimizes the impact of breaches by ensuring that as security controls are compromised, the
data remains protected.
About the Author
As Chief Strategy Officer at Donoma Software, Parker Pearson leads the
company's mission to revolutionize enterprise data privacy protection. With
over twenty years of experience in technology innovation and
entrepreneurship, she helps turn cutting-edge ideas into real-world
solutions that solve complex business problems. At Donoma, she has
helped power the company from startup to industry disruptor with their
innovations in continuous encryption and privacy enhancing technology.
Her expertise lies in making innovation understandable and aligned to meet
evolving client challenges. She consistently seeks the next challenge to
bring new ideas to life and transform them into commercially available
solutions organizations need. What drives her most is the belief that
curiosity, creativity and imagination are the true source of innovation. The
rest is just ones and zeros.
Parker can be reached online at https://www.linkedin.com/in/ppearson/ through the Donoma Software
website: https://www.donomasoftware.com/.
Cyber Defense eMagazine – September 2025 Edition 242
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.