Blog

Virtual Terminal

06 Jun
2018

General Data Protection Regulation: Pseudonymization vs. Anonymization

General Data Protection Regulation: Pseudonymization vs. Anonymization What is Pseudonymization? The General Data Protection Regulation (GDPR) is now in effect, with strong requirements to protect the personal data of European Union (EU) data subjects “by design and by default.“ Though the GDPR doesn’t contain detailed technical requirements for data security,

04 Jun
2018

Enough of PCI, how do we get our company out of scope?

Enough of PCI, how do we get our company out of scope? For years now, your organization has been working on achieving and maintaining PCI compliance.  Year after year, a Qualified Security Assessor (QSA) comes on-site to assess your environment.  Sometimes, if you’re lucky, that QSA is the same person

22 May
2018

6 Takeaways for Blockchain

6 Takeaways for Blockchain Organizations are starting to understand the power of a distributed ledger system, and Blockchain is being tested and implemented across multiple industries across the globe. Gartner’s blockchain hypecycle research found that some industries will not reach maturity for 5-10 years with others not reaching maturity for

01 May
2018

5 Takeaways RSA 2018

5 Takeaways RSA 2018 As more than 50,000 people descended upon San Francisco to learn about more cybersecurity, the event could easily just pass out of mind in a blur of booths, faces, slogans, and jumbled snippets of information. I think it is important to take a step back to

26 Apr
2018

How Does Data Sovereignty Impact Collecting Personal Information Through IoT?

How Does Data Sovereignty Impact Collecting Personal Information Through IoT? With the Internet of Things (IoT) connections growing from 8 billion in 2017 to 20 billion by 2020, it is important to understand the potential impact data sovereignty will play for organizations collecting and sharing customers’ personal information. International organizations

23 Apr
2018

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 2 of 2

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 2 of 2 In part 1 of this blog series we covered how the IoT (Internet of Things) creates a vast multi-point attack surface that can be the Achilles heel of connected devices, potentially revealing personal

03 Apr
2018

5 Takeaways from IAPP Global Privacy Summit

5 Takeaways from IAPP Global Privacy Summit The IAPP Global Privacy Summit was held last week in Washington, DC. TokenEx had the privilege of participating in the Summit as a sponsoring vendor.  It was refreshing to get exposed to so many great people, ideas, and developments in this exciting space.