Nov 15, 2019 l Tokenization, Data-Centric Security, Big Data, Data Analytics

Big Data Security Series Part 3: How to Run Analytics on Protected Data

In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA environments. So how can we protect data in these complex environments and be compliant? How can we use the data beautifully when we have challenges like that?One word: tokenization. Tokenization provides...

Read more

Nov 15, 2019 l Tokenization, Data-Centric Security, Big Data, Data Analytics

Big Data Security Series Part 3: How to Run Analytics on Protected Data

In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA...

read more

Nov 1, 2019 l Compliance, Data-Centric Security, Big Data, Data Analytics, Cloud Computing, challenges, IoT

Big Data Security Series Part 2: How Hard is it to Secure Big Data?

Survey says: exceedingly difficult.

But why?

Years ago, on traditional databases you had complete control over how to implement and protect your...

read more

Oct 29, 2019 l PCI, DataProtection, Tokenization, PCI DSS, DataPrivacy, digital payments, Data-Centric Security, out-of-scope

3 Benefits of Taking Data Out of PCI Audit Scope

Whether your company accepts payments at a store or restaurant, sells products or services through a website, or handles monthly payment billing,...

read more

Oct 21, 2019 l Tokenization, GDPR, PCI DSS, Data Security, Data Protection, Data Privacy, digital payments, open banking, Compliance, Data Breach, Data-Centric Security, Pseudonymisation, Cyber-security, #ccpa

5 Trends Happening in Payments – Data Security is needed more than ever

A locally-famous Thai restaurant in San Diego County posted a message to customers requesting that they pay with a credit card, due to increased...

read more

Oct 16, 2019 l PCI, DataProtection, Tokenization, GDPR, PCI DSS, DataPrivacy, digital payments, Data-Centric Security, #ccpa

CCPA:  Data Privacy like GDPR; Data Security like PCI DSS

Comparisons have already been drawn about the California Consumer Privacy Act (CCPA), calling it ‘the GDPR for California residents.’ However,...

read more

Aug 6, 2019 l Data Security, Data Protection, Data Privacy, Data Breach, Data-Centric Security, CFO, Cyber-security

Is it critical for CFOs to understand cybersecurity?

Looking at the impact a data breach can have in terms of regulatory fees, customer trust as well as loyalty and as a consequence, shareholder...

read more

Aug 2, 2019 l Tokenization, Data Security, Data Privacy, Data Breach, Data-Centric Security, Cybercrime, Pseudonymisation, Cloud Computing, Multicloud, #capitalonebreach

6 takeaways from the Capital One data breach

"WHAT'S IN YOUR WALLET?" is the theme question asked by spokes-celebrity Jennifer Garner in commercials for Capital One. A data breach wasn't...

read more

Jun 11, 2019 l Tokenization, Data-Centric Security, Big Data, Data Analytics

A Torrid Affair: Data Analytics and Data Protection

Friends with Benefits or Deadlocked Foes?

With the rapid expansion of data analytics frameworks and technologies, the ability to mine and gain...

read more

Jun 3, 2019 l Tokenization, Data Security, Data-Centric Security, Big Data, Data Analytics

How to End the Tug of War Between Data Analytics and Data Security

Data analysts want access to large volumes of data because, generally speaking, the bigger the sample size, the more accurate the predictions. One...

read more
1 2

Subscribe to the comforte Insights Blog

Get comforte's latest articles delivered straight to your inbox. Always stay up to date!
Simply enter your name and email address below: