In 2006, the Council of Europe decided to launch a day that celebrated the concept of data privacy. As this is such a critical topic, Data Privacy...
Oct 29, 2020 l PCI DSS, Data Protection, Compliance, Regulations
PCI DSS Compliance Flagged as Major Concern in Verizon Business Report
There was much anticipation from those within the finance and security industries to learn about the key findings from the Verizon 2020 Payment...
Aug 20, 2020 l Tokenization, Data Security, Data Protection, Data-Centric Security
How to Get your Data-Centric Security Project off the Ground
Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes,...
Jun 2, 2020 l Data Security, Data Privacy, Compliance
Experts Discuss: Where Data Security and Data Privacy Meet
A few weeks ago, comforte AG hosted an online webinar featuring Forrester. The focus of that presentation was the intersection point between data...
Companies are investing more and more in data protection. Compliance rules and regulations require organizations to develop sound security...
Mar 4, 2020 l Tokenization, Data Security, Data Protection, Data Breach
Breach Prevention is so 2010: Now is the Time to Protect Data Itself
The trend towards digital transformation means companies are using and monetizing data more and more. Today, there is not only more data, data is...
Jan 7, 2020 l Tokenization, Data-Centric Security, Big Data, Data Analytics
6 Things Every Big Data Security Solution Needs
As data-centric security gains mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are...
Dec 3, 2019 l Data Security, Data Breach, PII
Rogue Staff Member at Leading Cybersecurity Company Leaks Customer Data
It's always an unfortunate occurrence when a company gets hit by a cyberattack. When a cybersecurity company gets breached, then the alarm bells...
Nov 15, 2019 l Tokenization, Data-Centric Security, Big Data, Data Analytics
Big Data Security Series Part 3: How to Run Analytics on Protected Data
In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA...