Mar 22, 2019 l Data Protection, Data-Centric Security, Big Data

3 Ways CISOs Enable Big Data Innovation

You might not realize it, but if you are involved in an innovation project that is aiming to generate additional business value by leveraging data and analytics, your success very much depends on your organization’s CISO and the team around that function. Don’t believe me? Well, read on.

Read more

Mar 22, 2019 l Data Protection, Data-Centric Security, Big Data

3 Ways CISOs Enable Big Data Innovation

You might not realize it, but if you are involved in an innovation project that is aiming to generate additional business value by leveraging data...

read more

Feb 22, 2019 l Data Protection, Data-Centric Security, SecurDPS

Are we a thumbs up or a thumbs down?

In the ’80s and ’90s, there was a popular TV program called “Siskel & Ebert.” It was a weekly television series where two critics reviewed newly...

read more

Jan 17, 2019 l GDPR, Compliance, Data-Centric Security

GDPR - Biggest Fail of 2018?

I recently read a post in which someone claimed that GDPR was probably the biggest fail of 2018.

Really? I can’t stop myself from writing a...

read more

Nov 30, 2018 l digital payments, Data-Centric Security

comforte AG Named Among Top 10 Providers of Payments Security Solutions of 2018

Wiesbaden, Germany - November 30, 2018 - comforte AG has been named among the Top 10 Payments and Security Solutions Providers of 2018 by...

read more

Nov 29, 2018 l Tokenization, GDPR, PCI DSS, Compliance, Data-Centric Security

Why Data-Centric Security Should be a Part of your GDPR Strategy

If you've been to any security conference, tradeshow, or read any industry journals in 2018 you will find yourself bombarded by lots of...

read more

Nov 16, 2018 l GDPR, Compliance, Data-Centric Security

How to Avoid the GDPR Auditor's Crosshairs

The General Data Protection Regulation came into effect on May 25, 2018 and while there was tremendous noise around this event and it seemed as if...

read more

Sep 28, 2018 l GDPR, PCI DSS, Data Protection, Compliance, Data-Centric Security, Regulations, Cybercrime

Cybercrime Doesn't Follow Regulations - Part III: What's Next?

In the past two blog posts we looked at regulations, the history of hacking, and cybercrime today.

read more
1

Subscribe to the comforte Insights Blog

Get comforte's latest articles delivered straight to your inbox. Always stay up to date!
Simply enter your name and email address below: