May 28th, 2020

Cloud security and data protection: What enterprises need to know

Data security is rarely the first consideration when choosing a public cloud service provider. That’s changing, though, because of the rise of tougher rules, regulations, and standards aimed at protecting consumer privacy. Without data security, there can be no privacy. Laws such as the EU’s…

Read More

Data security is rarely the first consideration when choosing a public cloud service provider. That’s changing, though, because of the rise of tougher rules, regulations, and standards aimed at protecting consumer privacy. Without data security, there can be no privacy. Laws such as the EU’s…

Read More

May 22nd, 2020

Two Years In, IT Thought Leaders Evaluate GDPR’s Impact

It’s been two years since the General Data Protection Regulation, or GDPR, was put into force by the European Union on May 25, 2018. eWEEKhas coveredthe genesis, institution and passage of this pioneering international data privacy law since long before that date became a milestone…

Read More

It’s been two years since the General Data Protection Regulation, or GDPR, was put into force by the European Union on May 25, 2018. eWEEKhas coveredthe genesis, institution and passage of this pioneering international data privacy law since long before that date became a milestone…

Read More

“A Security Analysis of Tokenization Systems”

Get the White Paper This white paper looks at specific tokenization methods and addresses how an adversary could execute attacks to gain knowledge of the transform method and ultimately reverse tokens to steal the protected data. The analysis includes an overview of three different tokenization…

View Now

Get the White Paper This white paper looks at specific tokenization methods and addresses how an adversary could execute attacks to gain knowledge of the transform method and ultimately reverse tokens to steal the protected data. The analysis includes an overview of three different tokenization…

View Now

May 7th, 2020

Privacy vs. public health: Where contact tracing fits

Data privacy leaves room for gray areas. Public health is more black and white. The question is, whether entities — governments, healthcare organizations, businesses — will exploitthat gray area by using tech-enabled contact tracing. “We all want public health to win at this point in…

Read More

Data privacy leaves room for gray areas. Public health is more black and white. The question is, whether entities — governments, healthcare organizations, businesses — will exploitthat gray area by using tech-enabled contact tracing. “We all want public health to win at this point in…

Read More

April 27th, 2020

NEWS INSIGHTS: APPLE AND GOOGLE WANT TO TURN YOUR PHONE INTO A COVID-TRACKING MACHINE

The new contact-tracing tool, explained. Apple and Google want to turn your phone into a Covid-tracking machine Apple and Google recently announced a joint plan to create an app for iPhones and Androids that will allow them to keep a record of every other phone…

Read More

The new contact-tracing tool, explained. Apple and Google want to turn your phone into a Covid-tracking machine Apple and Google recently announced a joint plan to create an app for iPhones and Androids that will allow them to keep a record of every other phone…

Read More

April 3rd, 2020

Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach

The Marriott International hotel chain has fallen victim to its second major data breach in as many years, after information of 5.2 million guests was accessed using the login credentials of two employees at a franchise property. Compromised information may involve contact details, including postal…

Read More

The Marriott International hotel chain has fallen victim to its second major data breach in as many years, after information of 5.2 million guests was accessed using the login credentials of two employees at a franchise property. Compromised information may involve contact details, including postal…

Read More

Healthcare White Paper

Enabling the Safe Sharing of Healthcare Information This white paper describes how the SMPC approach can be utilized to enable secure data sharing use cases such as community health information sharing. The technical feasibility and operationalization of such a solution is a reality today and can…

View Now

Enabling the Safe Sharing of Healthcare Information This white paper describes how the SMPC approach can be utilized to enable secure data sharing use cases such as community health information sharing. The technical feasibility and operationalization of such a solution is a reality today and can…

View Now

February 25th, 2020

The 12 Hottest Identity And Data Protection Tools Unveiled At RSA 2020

Defending Users And Their Information Vendors attending RSA 2020 have invested heavily in making it easier for customers and partners to isolate sensitive data and processes, gain visibility into unknown usage of customer data, improve data utilization, and secure sensitive data in files that are…

Read More

Defending Users And Their Information Vendors attending RSA 2020 have invested heavily in making it easier for customers and partners to isolate sensitive data and processes, gain visibility into unknown usage of customer data, improve data utilization, and secure sensitive data in files that are…

Read More