Data Tokenization:Why Governments Should Implement It?

Protecting national security is paramount for any government agency, and the first step is securing all public-sector information. If any such data were to get into the wrong hands, both national security ...

5 Steps to Protect Sensitive Data

Companies are investing more and more in data protection. Compliance rules and regulations require organizations to develop sound security strategies in order to protect their valuable data assets and data privacy ...

What is the Best Way to Protect Data?

When it comes to advancements in data encryption, you can find a lot of news on quantum computing (which could easily decrypt anything encrypted), homomorphic encryption (which returns results on processing encrypted ...

Breach Prevention is so 2010: Now is the Time to Protect Data Itself

The trend towards digital transformation means companies are using and monetizing data more and more. Today, there is not only more data, data is also far more valuable due to the constant ...

Is the US Ready for Centralized Data Privacy Enforcement?

The recent news about a proposed bill to create a central data privacy enforcing body shines another spotlight on the high-risk, high stakes shifting ground that many businesses operate their engines of ...

PCI DSS Compliance Lower than Ever

In Verizon’s 2019 Payment Security Report, it was revealed that in 2018 only 36.7% of businesses are fully compliant with the Payment Card Industry Data Security Standard (PCI DSS). Indeed, over the ...

6 Things Every Big Data Security Solution Needs

As data-centric security gain mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are faced with choosing a solution from an increasing array of options. However, ...

Domain Provider ‘Network Solutions’ Announces Data Breach

In a recent statement, the world’s first Internet domain name provider, Network Solutions, revealed that they were the target of a data breach. The company announced that an unknown third-party acquired unauthorized ...

Big Data Security Series Part 3: How to Run Analytics on Protected Data

In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA environments. So how can we protect ...

3 Benefits of Taking Data Out of PCI Audit Scope

Whether your company accepts payments at a store or restaurant, sells products or services through a website, or handles monthly payment billing, you or someone at your company is most likely aware ...