Aug 20, 2020 l Tokenization, Data Security, Data Protection, Data-Centric Security

How to Get your Data-Centric Security Project off the Ground

Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes,...

read more

Aug 4, 2020 l Data Protection, Cloud, Cloud Security

Insurance CISO Concerns With Cloud Migration

With digital transformation a term most will be familiar with now, we could say with some certainty that many industries have either already...

read more

Jul 28, 2020 l GDPR, Data Protection, Data Privacy

European Court of Justice at an Impasse with US Over Privacy Shield

You might have recently seen that the European Court of Justice (ECJ) put an end to a digital trade agreement involving the transfer of EU data to...

read more

Jul 21, 2020 l Tokenization, Data Protection, Coronavirus, Pandemic, Covid-19

Pandemics Create New Attack Opportunities in Travel and Hospitality

Hospitality and travel data breaches in a pandemic create new risks and threats to citizens on a global basis. Data breaches from airline, travel,...

read more

Jul 14, 2020 l Tokenization, Data Protection, Data-Centric Security

How Secret Isolation Affects Your Data Security Mechanisms

When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to...

read more

Jul 7, 2020 l GDPR, Data Protection, Pseudonymisation

ENISA Guidelines Endorsed Pseudonymisation Even Before GDPR

The formation of the European General Data Protection Regulation (GDPR) signified a watershed moment for European citizens, and data processing....

read more

Jun 30, 2020 l Data Protection, DataPrivacy, Cyber-security

Is Your Security Posture Holistic?

Holistic security means more than just implementing one tool, one method, one solution, or one process to protect your business’s data. It means...

read more

Apr 21, 2020 l Tokenization, Data Security, Data Protection

5 Steps to Protect Sensitive Data

Companies are investing more and more in data protection. Compliance rules and regulations require organizations to develop sound security...

read more

Mar 10, 2020 l Tokenization, Data Protection

What is the Best Way to Protect Data?

When it comes to advancements in data encryption, you can find a lot of news on quantum computing (which could easily decrypt anything encrypted),...

read more
1 2 3 4

Subscribe to the comforte Blog

Get comforte's latest articles delivered straight to your inbox. Always stay up to date!

Simply fill out the form below and hit Subscribe.