Risk Acceptance and Security Trade-offs: Managing Performance vs. Security

I recently read a note by someone discussing the futility of having engineers focus on performance cycles in order to optimize data encryption operations, and…

A DataSecOps approach to cloud migration is not negotiable

A DataSecOps Approach to Cloud Migration Is Not Negotiable

A recent study of CIOs offered good news for those concerned about cloud data protection. It reported that 86% of respondents are now viewing security…

cloud misconfigurations

Cloud misconfigurations: a surging, but overlooked threat to cloud data security

Enterprises continue to migrate their workloads to the cloud with the promise of lower costs, increased agility and greater flexibility. But cloud migration also brings…

combining data utilization and privacy

Combining CCPA Compliant Data Utilization and Privacy

Today marks the first day the attorney general will enforce the CCPA or California Consumer Privacy Act, a milestone day for all of us, who,…

are gdpr and other privacy regulations enough

Are GDPR and Other Privacy Regulations Enough?

Two years ago, the General Data Protection Regulation (GDPR) was introduced and hailed as the most significant change in data privacy regulation in two decades….

why data tokenization is insecure

Why data tokenization is insecure

(Why you can’t stop data breaches – Part II) This blog, the second in a series on “Why you can’t stop data breaches,” details various…

are your data security protocols ccpa-ready?

CCPA Compliance: Are Your Data Security Protocols CCPA-Ready?

On January 1, 2020, the California Consumer Privacy Act (CCPA) became operational, however, enforcement of privacy-related suits cannot be initiated until July 1. The regulation,…


Why you can’t stop data breaches – Part I

Data Breaches Over the past decade plus, we’ve seen a continued onslaught of data breaches via cyber-attacks, phishing scams, malware, ransomware, and other new cybercriminal activity. And there are no…


Secure data analytics and info sharing for healthcare

Obviously, there’s a lot of focus on the healthcare industry these days and rightly so. We’ve been working with several organizations recently with our secure…