How to Start a Data Security Project? | comforte AG

How to Get your Data-Centric Security Project off the Ground

Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes, especially concerning the many demands of modern regulations ...

Cisco Survey Demonstrates Financial Benefit of Enterprise Data Security

"Privacy has become an attractive investment even beyond any compliance requirements. Organizations that get privacy right improve their customer relationships, operational efficiency, and bottom-line results." - Cisco Data Privacy Benchmark Study 2020 ...

Pandemics Create New Attack Opportunities in Travel and Hospitality

Hospitality and travel data breaches in a pandemic create new risks and threats to citizens on a global basis. Data breaches from airline, travel, and hospitality IT and cloud platforms present a ...
The Concept of Secret Isolation | comforte AG

How Secret Isolation Affects Your Data Security Mechanisms?

When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to protect personal information from unauthorized access. Encryption is a highly ...

Data Tokenization:Why Governments Should Implement It?

Protecting national security is paramount for any government agency, and the first step is securing all public-sector information. If any such data were to get into the wrong hands, both national security ...

5 Steps to Protect Sensitive Data

Companies are investing more and more in data protection. Compliance rules and regulations require organizations to develop sound security strategies in order to protect their valuable data assets and data privacy ...

What is the Best Way to Protect Data?

When it comes to advancements in data encryption, you can find a lot of news on quantum computing (which could easily decrypt anything encrypted), homomorphic encryption (which returns results on processing encrypted ...

Breach Prevention is so 2010: Now is the Time to Protect Data Itself

The trend towards digital transformation means companies are using and monetizing data more and more. Today, there is not only more data, data is also far more valuable due to the constant ...

Is the US Ready for Centralized Data Privacy Enforcement?

The recent news about a proposed bill to create a central data privacy enforcing body shines another spotlight on the high-risk, high stakes shifting ground that many businesses operate their engines of ...

PCI DSS Compliance Lower than Ever

In Verizon’s 2019 Payment Security Report, it was revealed that in 2018 only 36.7% of businesses are fully compliant with the Payment Card Industry Data Security Standard (PCI DSS). Indeed, over the ...