Nov 1, 2019 l Compliance, Data-Centric Security, Big Data, Data Analytics, Cloud Computing, challenges, IoT

Big Data Security Series Part 2: How Hard is it to Secure Big Data?

Survey says: exceedingly difficult.

But why?

Years ago, on traditional databases you had complete control over how to implement and protect your servers. You also had a manageable number of servers, let’s say around 10, you had your hardened environment, and you were able to do anything you wanted with the data you had.

Read more

Aug 2, 2019 l Tokenization, Data Security, Data Privacy, Data Breach, Data-Centric Security, Cybercrime, Pseudonymisation, Cloud Computing, Multicloud, #capitalonebreach

6 takeaways from the Capital One data breach

"WHAT'S IN YOUR WALLET?" is the theme question asked by spokes-celebrity Jennifer Garner in commercials for Capital One. A data breach wasn't...

read more

Sep 28, 2018 l GDPR, PCI DSS, Data Protection, Compliance, Data-Centric Security, Regulations, Cybercrime

Cybercrime Doesn't Follow Regulations - Part III: What's Next?

In the past two blog posts we looked at regulations, the history of hacking, and cybercrime today.

read more
1

Subscribe to the comforte Insights Blog

Get comforte's latest articles delivered straight to your inbox. Always stay up to date!
Simply enter your name and email address below: