Comforte Inc. Announces New Partnership with Logic20/20

New York, New York - 15 July 2021 - Enterprise data security experts comforte Inc. have announced a new partnership with Seattle-based business and technology consulting firm Logic20/20 ... Read More

Balancing Agility with Data Security

Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and functionality to be available in the product on a regular basis. As ... Read More

The Verizon Data Breach Investigation Report – How do you Use it?

The annual Verizon DBIR (Data Breach Investigation Report) is a great tool full of lots of actionable information. However, at over 100 pages full of detailed information, it can seem a bit like walking into a modern hardware store and wondering where to look to find what you would need ... Read More

Data Racing on the Cloud Speedway

Even if you’re not an avid racing fan, you’ve no doubt driven a car. The speeds in racing are extreme compared to driving around the city, but the concepts of speed are the same no matter where you’re driving. Go too fast and you lose control, go too slow, well, ... Read More

New Nacha Data Security Requirements Coming up

The National Clearing House Association (Nacha) is a non-profit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through the development of rules, standards, governance, education, advocacy, and in support of innovation, Nacha's efforts benefit the ... Read More

A Company Culture of Data Privacy – Your Role as a Data Caretaker

The big cloud service providers—think Amazon Web Services, Microsoft, and Google—are very clear about the shared responsibility model. If you distill out of it all the nuances and variables, this model comes down to a single fact: the cloud provider is responsible for the tools or services (and the supporting ... Read More
The Concept of Secret Isolation | comforte AG

How Secret Isolation Affects Your Data Security Mechanisms?

When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to protect personal information from unauthorized access. Encryption is a highly touted means of security. While this can be a positive and useful method to secure data, the downside ... Read More

Is Your Security Posture Holistic?

Holistic security means more than just implementing one tool, one method, one solution, or one process to protect your business’s data. It means exploring every avenue to implement a multi-pronged defensive strategy and never depending on just a single security tool or solution. Organizations that follow more holistic approaches to ... Read More

Time’s Up!

| | Compliance, GDPR, LGPD
August 15th is nearly here, and that means compliance with Brazil’s LGPD ... Read More
Loading...