Quantcast
Channel: Data Security – Protegrity
Browsing all 113 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Data Security in a Data-Driven World (Part 3): Get the Quick Win!

In Part 1 of this blog series, we introduced the topic of boundaries, how traditional silo-oriented thinking is arguably the biggest barrier to implementing comprehensive data security. In Part 2, we...

View Article


Image may be NSFW.
Clik here to view.

With Data Comes Responsibility, With Breaches Come Blame

CISOs and data security professionals struggling with the burden of ever increasing amounts of data, cyber threats and privacy regulations are looking for a simpler and more effective way to meet...

View Article


Image may be NSFW.
Clik here to view.

One for all and all for one…

Never mind Dumas, do you own a Swiss Army knife, a Leatherman or a universal remote? Multipurpose makes sense right? While one-size-fits-all implies a compromise, having the right tool for the right...

View Article

Image may be NSFW.
Clik here to view.

Are you going to be the next Yahoo?

Are you going to be the next Yahoo? Listen to what CIOs have to say Several years ago, I was at a major tech event. A person that I did not know came up and asked me and the person I was talking to for...

View Article

Image may be NSFW.
Clik here to view.

What is the Difference between Tokenization and Encryption?

More and more organizations are moving from encryption to tokenization, recognizing that it is a more secure, more flexible and more cost-effective approach – they realize that tokenization goes well...

View Article


Image may be NSFW.
Clik here to view.

How Can Data Security Tip the Scales in Privilege vs. Protection?

For any organization that requires the storage and use of sensitive data for operational functions, there will always be a tug of war between access and security. Importantly, the principle of Least...

View Article

Image may be NSFW.
Clik here to view.

How safe is your SaaS implementation from a data loss?

Even with the growth in adoption of cloud based software-as-a-service (SaaS), concerns about data security have remained. While breaches have been infrequent at SaaS vendors, questions persist about...

View Article

Image may be NSFW.
Clik here to view.

Customers Say, “Lose Our Data, Lose Our Business”

Customers have come to rely on brands known for taking security seriously and conversely, are less likely to trust brands that have had known security breaches, according to Return Path CISO Dennis...

View Article


CFOs: Do You Protect Your Corporate Data?

Grant Thornton finds that many of you do This post originally appeared on The Innovation Enterprise blog. I admit it, I am a Star Trek fan. I love especially when Captain Piccard says to his team ‘make...

View Article


Image may be NSFW.
Clik here to view.

Data Security in a Data-Driven World (Part 2): Follow the Money!

In Part I of this blog series, we introduced the topic of boundaries, how traditional silo-oriented thinking is arguably the biggest barrier to implementing comprehensive data security. In this second...

View Article

Image may be NSFW.
Clik here to view.

Data Security in a Data-Driven World (Part 3): Get the Quick Win!

In Part 1 of this blog series, we introduced the topic of boundaries, how traditional silo-oriented thinking is arguably the biggest barrier to implementing comprehensive data security. In Part 2, we...

View Article

Image may be NSFW.
Clik here to view.

With Data Comes Responsibility, With Breaches Come Blame

CISOs and data security professionals struggling with the burden of ever increasing amounts of data, cyber threats and privacy regulations are looking for a simpler and more effective way to meet...

View Article

Image may be NSFW.
Clik here to view.

One for all and all for one…

Never mind Dumas, do you own a Swiss Army knife, a Leatherman or a universal remote? Multipurpose makes sense right? While one-size-fits-all implies a compromise, having the right tool for the right...

View Article


Image may be NSFW.
Clik here to view.

Are you going to be the next Yahoo?

Are you going to be the next Yahoo? Listen to what CIOs have to say Several years ago, I was at a major tech event. A person that I did not know came up and asked me and the person I was talking to for...

View Article

Image may be NSFW.
Clik here to view.

What is the Difference between Tokenization and Encryption?

More and more organizations are moving from encryption to tokenization, recognizing that it is a more secure, more flexible and more cost-effective approach – they realize that tokenization goes well...

View Article


Image may be NSFW.
Clik here to view.

How Can Data Security Tip the Scales in Privilege vs. Protection?

For any organization that requires the storage and use of sensitive data for operational functions, there will always be a tug of war between access and security. Importantly, the principle of Least...

View Article

Image may be NSFW.
Clik here to view.

CMOs Seeking Customer Intimacy Need to Protect Customer Data

Digital disruption changes the customer experience In this era of digital disruption, customer experience rules. The President of Hyatt hotels for example claims, “Customers today buy experiences not...

View Article


Image may be NSFW.
Clik here to view.

CFOs: Do You Protect Your Corporate Data?

Grant Thornton finds that many of you do This post originally appeared on The Innovation Enterprise blog. I admit it, I am a Star Trek fan. I love especially when Captain Piccard says to his team ‘make...

View Article

Image may be NSFW.
Clik here to view.

How CIOs Achieve Relevance Within Their Businesses

If you ask CIOs today about their challenges, several things make their list, not the least the fact that things are changing a lot faster these days. One CIO said to me in exasperation, “Things are...

View Article

Image may be NSFW.
Clik here to view.

“The law requires that organisations take appropriate measures to keep...

Sadly there’s yet another major company in the news with headlines about a data breach that we would all dread to see about our own organisation. Breaches can come internally and externally and...

View Article
Browsing all 113 articles
Browse latest View live