Consumer trust in online services is a growing preoccupation of today’s boardrooms. That’s because customers are increasingly prepared to walk if...
Feb 16, 2023 l Data Protection, Compliance
Privacy-by-Design Becomes an ISO Standard: a New Driver for Data-Centric Security
Dec 2, 2022 l Data Protection, Big Data Analytics, Cloud Computing
How to Complete a Cloud Security Assessment
Cloud computing is driving a new post-pandemic wave of digital transformation across the globe. Gartner forecasts spending on related services will...
Sep 29, 2022 l Data Protection, Data Discovery & Classification
Why Data Discovery is the First Step to Effective Data-Centric Security
In a world of IT complexity, escalating cyber risk and rigorous compliance requirements, data-centric security is winning favor with a growing number...
Jul 28, 2022 l Data Protection, Data Breaches, Research, Trends, and Predictions
Report: Data-Centric Security Could Save Breached Firms Over $750K
Organizations are investing more than ever in cybersecurity. Recent research reveals that mean spending was up 60% year-on-year to reach $5.3m, and...
At comforte, we’ve been talking about the benefits of data-centric security for years. But for IT security buyers, having the right information to...
Jun 14, 2022 l Data Protection, Financial Services
Financial Services Firms Must Protect Data to Mitigate Growing Risks
Organizations in most verticals experienced a surge in cyber-threats over the course of the pandemic. But the criticality of financial services and...
Jun 10, 2022 l News, Partnerships, EMEA
M² Business Consulting GmbH and comforte AG Announce New Partnership for Secure Digital Enablement
Wiesbaden, Germany - 10 June 2022 - Enterprise data security company comforte AG and M² Business Consulting GmbH have announced a new partnership to...
After a year of unprecedented cyber-threat activity, the world’s risk managers are in agreement. The number one business risk for 2022 is “cyber...
May 12, 2022 l Data Protection, Data Breaches
Why Data Protection is the First Step to Mitigating Insider Risk
Much is written about the corporate threat from shadowy remote hackers. A cybercrime economy worth trillions has certainly made this disparate bunch...