Unless you’ve been living under a rock, you’ve no doubt heard of the metaverse and the major tech players who are lining up to become dominant...
Jan 25, 2022 l Data Protection, Data Breaches
Supply Chain Attacks on the Rise - How can they be Prevented?
As 2021 wound down, many of us in the cybersecurity industry made predictions about continued attacks against targets positioned within supply...
Jan 20, 2022 l Data Protection
The Next Generation of Performant Data Protection: a New FPE Algorithm
At the most recent Asiacrypt 2021 virtual conference, convened this past December, I was part of a collaborative team of cryptographers presenting a...
Jan 13, 2022 l GDPR, Data Protection, Compliance, CCPA
17 Countries with GDPR-like Data Privacy Laws
GDPR wasn't the beginning and it certainly won't be the end. Strict data privacy legislation with extraterritorial applicability is appearing in more...
Dec 21, 2021 l Data Protection
New Year's Resolution for 2022: be more Proactive About Data Security
Yes, winter is approaching. I know, it sounds like the prophetic line from the popular books and TV series Game of Thrones. But it’s true—cold (and...
Getting from point A to point B in a car always seems to be a pretty easy proposition, at least until you’re behind the wheel and moving. On a map,...
The other day, my colleague Brett Bicker, who heads up comforte’s enterprise market development team, and I were on a Zoom call ready to record our...
None of us likes to be told what to do. Especially when what we’re being told (or ordered) to do is tedious, expensive, unexciting, or counter to...
Nov 23, 2021 l Data Protection, Data Discovery & Classification
A Few Points About Point Products for Protecting Private Data
One of the big challenges with implementing narrow point products for enterprise data security is that the IT ecosystem in which your data resides is...