Tagged as: #datasecurity

26 Jun
2018

Establishing a GDPR Risk Averse Strategy for Your Enterprise

Establishing a GDPR Risk Averse Strategy for Your Enterprise Now that the GDPR (General Data Protection Regulation) has gone into effect, there is very much a wait and see approach on how the regulation will shake out in regard to lawsuits and non-compliant behavior. Facebook and Google were the first

01 May
2018

5 Takeaways RSA 2018

5 Takeaways RSA 2018 As more than 50,000 people descended upon San Francisco to learn about more cybersecurity, the event could easily just pass out of mind in a blur of booths, faces, slogans, and jumbled snippets of information. I think it is important to take a step back to

26 Apr
2018

How Does Data Sovereignty Impact Collecting Personal Information Through IoT?

How Does Data Sovereignty Impact Collecting Personal Information Through IoT? With the Internet of Things (IoT) connections growing from 8 billion in 2017 to 20 billion by 2020, it is important to understand the potential impact data sovereignty will play for organizations collecting and sharing customers’ personal information. International organizations

23 Apr
2018

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 2 of 2

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 2 of 2 In part 1 of this blog series we covered how the IoT (Internet of Things) creates a vast multi-point attack surface that can be the Achilles heel of connected devices, potentially revealing personal

29 Mar
2018

Leveraging ISO/IEC Data Security Standards to Prepare for GDPR

Leveraging ISO/IEC Data Security Standards to Prepare for GDPR The deadline for your organization to get compliant for the EU GDPR (European Union General Data Protection Regulation) is right around the corner. Understanding where your data is today, and developing a process to provide consent or the right to be

28 Feb
2018

TokenEx and Cloud Constellation Corporation Offering Market Disruptive Space-Based Tokenization Data Vault Services

TokenEx and Cloud Constellation Corporation Offering Market Disruptive Space-Based Tokenization Data Vault Services Customers Will be Able to Execute Transactions with an Unprecedented Reduction of Data Breach Risk TokenEx was founded by two Qualified Security Assessors (QSAs) as a Cloud Data Protection Platform, providing tokenization, encryption, and data vaulting as

03 Nov
2017

Format Preserving Encryption and NIST 800-38G.  What You Need to Know.

Format Preserving Encryption and NIST 800-38G.  What You Need to Know. In April (2017) a cryptanalytic attack was discovered on the FF3 method for Format Preserving Encryption (FPE) by NIST (National Institute of Standards and Technology). As a result, FF3 was declared no longer suitable as a general purpose FPE