Sep 10, 2020 l Tokenization, PCI DSS, Data Protection, Compliance, Cloud Native

PCI DSS 4.0 and the Changing Approach to Compliance

In the past, the focus of PCI compliance was to store as little sensitive data as possible and keep it secured. In today's data driven world, that focus has changed. 

Read more

Jul 7, 2020 l GDPR, Data Protection, Pseudonymisation

ENISA Guidelines Endorsed Pseudonymisation Even Before GDPR

The formation of the European General Data Protection Regulation (GDPR) signified a watershed moment for European citizens, and data processing....

read more

Oct 21, 2019 l Tokenization, GDPR, PCI DSS, Data Security, Data Protection, Data Privacy, digital payments, open banking, Compliance, Data Breach, Data-Centric Security, Pseudonymisation, Cyber-security, CCPA

5 Trends Happening in Payments – Data Security is needed more than ever

A locally-famous Thai restaurant in San Diego County posted a message to customers requesting that they pay with a credit card, due to increased...

read more

Aug 2, 2019 l Tokenization, Data Security, Data Privacy, Data Breach, Data-Centric Security, Cybercrime, Pseudonymisation, Cloud Computing, Multicloud, #capitalonebreach

6 takeaways from the Capital One data breach

"WHAT'S IN YOUR WALLET?" is the theme question asked by spokes-celebrity Jennifer Garner in commercials for Capital One. A data breach wasn't...

read more

Jun 14, 2018 l Tokenization, GDPR, PCI DSS, Data Security, Data Protection, Data Privacy, Pseudonymisation

7 ways PCI DSS and GDPR overlap

How to kill two regulatory burdens with one stone

Becoming GDPR compliant can seem like a daunting task. So daunting in fact that some firms...

read more

May 14, 2018 l Tokenization, GDPR, HIPAA, PCI DSS, Data Security, Data Protection, Pseudonymisation

Don't be a dodo, secure your data!

If I was writing this in the early 2000s, I would have started with the line “open any newspaper and the headline will be screaming about…” but...

read more

Mar 14, 2018 l PCI, Tokenization, GDPR, Data Security, Data Protection, Pseudonymisation

The 4 things to consider for achieving true Data Security

Do you know how sometimes you can almost predict what question someone will ask you? You know, sort of like in Boston when mid-March rolls around...

read more
1

Subscribe to the comforte Insights Blog

Get comforte's latest articles delivered straight to your inbox. Always stay up to date!

Simply fill out the form below and hit Subscribe.