Domain Provider ‘Network Solutions’ Announces Data Breach

In a recent statement, the world’s first Internet domain name provider, Network Solutions, revealed that they were the target of a data breach. The company announced that an unknown third-party acquired unauthorized ...
Big Data Security Series Part 3: How to Run Analytics on Protected Data

Big Data Security Series Part 3: How to Run Analytics on Protected Data

In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA environments. So how can we protect ...
Data is Your Superpower: How to Protect Sensitive Data in Big Data Analytics

3 Benefits of Taking Data Out of PCI Audit Scope

Whether your company accepts payments at a store or restaurant, sells products or services through a website, or handles monthly payment billing, you or someone at your company is most likely aware ...
tokenization

Making a Case for Tokenization in the Enterprise

| | Data Security, Tokenization
Tokenization can be used to protect any sensitive data within an organization, with little overhead One of the most difficult tasks in information security is protecting sensitive data across complex, distributed enterprise ...
Security Boulevard
5 Trends Happening in Payments – Data Security is needed more than ever

5 Trends Happening in Payments – Data Security is needed more than ever

A locally-famous Thai restaurant in San Diego County posted a message to customers requesting that they pay with a credit card, due to increased crime in their area. They would rather process ...
CCPA:  Data Privacy like GDPR; Data Security like PCI DSS

CCPA:  Data Privacy like GDPR; Data Security like PCI DSS

Comparisons have already been drawn about the California Consumer Privacy Act (CCPA), calling it ‘the GDPR for California residents.’ However, drawing comparisons to PCI DSS as the title suggests may cause some ...
CLOUD Act

CLOUD Act, GDPR Changing Data Protection Game

GDPR is yesterday’s news; the CLOUD Act also poses challenges for companies in Europe: U.S. authorities may also access data that is physically located in Europe if it has been processed or ...
Security Boulevard
6 takeaways from the Capital One data breach

6 takeaways from the Capital One data breach

"WHAT'S IN YOUR WALLET?" is the theme question asked by spokes-celebrity Jennifer Garner in commercials for Capital One. A data breach wasn't supposed to be one of the things in your wallet ...
The Difference Between Format-Preserving Encryption and Tokenization

The Difference Between Format-Preserving Encryption and Tokenization

There is a lot of confusion surrounding this topic and, given recent developments such as the ANSI X9 standard for retail financial services, tokenization can actually be implemented with format-preserving encryption (FPE) ...
A Torrid Affair: Data Analytics and Data Protection

A Torrid Affair: Data Analytics and Data Protection

Friends with Benefits or Deadlocked Foes? With the rapid expansion of data analytics frameworks and technologies, the ability to mine and gain customer insights from datasets has never been easier. Creative analytics ...
Loading...