Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes,...
Aug 20, 2020 l Tokenization, Data Security, Data Protection, Data-Centric Security
How to Get your Data-Centric Security Project off the Ground
With digital transformation a term most will be familiar with now, we could say with some certainty that many industries have either already...
Jul 28, 2020 l GDPR, Data Protection, Data Privacy
European Court of Justice at an Impasse with US Over Privacy Shield
You might have recently seen that the European Court of Justice (ECJ) put an end to a digital trade agreement involving the transfer of EU data to...
Jul 21, 2020 l Tokenization, Data Protection, Coronavirus, Pandemic, Covid-19
Pandemics Create New Attack Opportunities in Travel and Hospitality
Hospitality and travel data breaches in a pandemic create new risks and threats to citizens on a global basis. Data breaches from airline, travel,...
Jul 14, 2020 l Tokenization, Data Protection, Data-Centric Security
How Secret Isolation Affects Your Data Security Mechanisms
When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to...
Jul 7, 2020 l GDPR, Data Protection, Pseudonymisation
ENISA Guidelines Endorsed Pseudonymisation Even Before GDPR
The formation of the European General Data Protection Regulation (GDPR) signified a watershed moment for European citizens, and data processing....
Holistic security means more than just implementing one tool, one method, one solution, or one process to protect your business’s data. It means...
Companies are investing more and more in data protection. Compliance rules and regulations require organizations to develop sound security...
When it comes to advancements in data encryption, you can find a lot of news on quantum computing (which could easily decrypt anything encrypted),...