Tagged as: tokenization

06 Jun
2018

General Data Protection Regulation: Pseudonymization vs. Anonymization

General Data Protection Regulation: Pseudonymization vs. Anonymization What is Pseudonymization? The General Data Protection Regulation (GDPR) is now in effect, with strong requirements to protect the personal data of European Union (EU) data subjects “by design and by default.“ Though the GDPR doesn’t contain detailed technical requirements for data security,

04 Jun
2018

Enough of PCI, how do we get our company out of scope?

Enough of PCI, how do we get our company out of scope? For years now, your organization has been working on achieving and maintaining PCI compliance.  Year after year, a Qualified Security Assessor (QSA) comes on-site to assess your environment.  Sometimes, if you’re lucky, that QSA is the same person

22 May
2018

6 Takeaways for Blockchain

6 Takeaways for Blockchain Organizations are starting to understand the power of a distributed ledger system, and Blockchain is being tested and implemented across multiple industries across the globe. Gartner’s blockchain hypecycle research found that some industries will not reach maturity for 5-10 years with others not reaching maturity for

01 May
2018

5 Takeaways RSA 2018

5 Takeaways RSA 2018 As more than 50,000 people descended upon San Francisco to learn about more cybersecurity, the event could easily just pass out of mind in a blur of booths, faces, slogans, and jumbled snippets of information. I think it is important to take a step back to

26 Apr
2018

How Does Data Sovereignty Impact Collecting Personal Information Through IoT?

How Does Data Sovereignty Impact Collecting Personal Information Through IoT? With the Internet of Things (IoT) connections growing from 8 billion in 2017 to 20 billion by 2020, it is important to understand the potential impact data sovereignty will play for organizations collecting and sharing customers’ personal information. International organizations

02 Apr
2018

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 1 of 2

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 1 of 2 If you think about it, “smart” devices are having an increasingly significant impact of our lives. Whether it’s a cellular phone or tablet, a wearable health monitor, or a series of in-home devices

29 Mar
2018

Leveraging ISO/IEC Data Security Standards to Prepare for GDPR

Leveraging ISO/IEC Data Security Standards to Prepare for GDPR The deadline for your organization to get compliant for the EU GDPR (European Union General Data Protection Regulation) is right around the corner. Understanding where your data is today, and developing a process to provide consent or the right to be