16 Reasons to use Third Party Cloud Security and not Salesforce Shield

tl;dr: Salesforce Shield has a hefty price tag on top of the SFDC license, despite offering limited protection within Salesforce and zero protection to other applications ...

Mass Move to the Cloud – 3 Essential Tips for Cloud Migration

Cloud technology has become indispensable for many organizations, however there are common mistakes and misconceptions that you should be aware of in order to keep your data secure, even as it travels ...

PCI DSS 4.0 and the Changing Approach to Compliance

In the past, the focus of PCI compliance was to store as little sensitive data as possible and keep it secured. In today's data driven world, that focus has changed.  ...
How to Start a Data Security Project? | comforte AG

How to Get your Data-Centric Security Project off the Ground

Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes, especially concerning the many demands of modern regulations ...

Cisco Survey Demonstrates Financial Benefit of Enterprise Data Security

"Privacy has become an attractive investment even beyond any compliance requirements. Organizations that get privacy right improve their customer relationships, operational efficiency, and bottom-line results." - Cisco Data Privacy Benchmark Study 2020 ...

Pandemics Create New Attack Opportunities in Travel and Hospitality

Hospitality and travel data breaches in a pandemic create new risks and threats to citizens on a global basis. Data breaches from airline, travel, and hospitality IT and cloud platforms present a ...
The Concept of Secret Isolation | comforte AG

How Secret Isolation Affects Your Data Security Mechanisms?

When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to protect personal information from unauthorized access. Encryption is a highly ...

Data Tokenization:Why Governments Should Implement It?

Protecting national security is paramount for any government agency, and the first step is securing all public-sector information. If any such data were to get into the wrong hands, both national security ...

5 Steps to Protect Sensitive Data

Companies are investing more and more in data protection. Compliance rules and regulations require organizations to develop sound security strategies in order to protect their valuable data assets and data privacy ...

What is the Best Way to Protect Data?

When it comes to advancements in data encryption, you can find a lot of news on quantum computing (which could easily decrypt anything encrypted), homomorphic encryption (which returns results on processing encrypted ...