For organizations, the aftermath of a data breach can be highly devastating. In an interconnected world, a single data vulnerability can cascade into decades of irreversible loss – intellectual, monetary, and reputational. The consequences paralyze even the most established businesses, uprooting them from their foundation. A classic example is that of a Delaware corporation, Blackbaud, […]
Ask a Data Ethicist: What Happens to Your Data When a Company Goes Bankrupt?
The recent meltdown of 23andme and what might become of their DNA database got me thinking about this question: What happens to your data when a company goes bankrupt? To say the past year has been a tough one for 23andme is an understatement. This latest turn of events, which involves infighting between management and […]
What Is Data Privacy? Definition, Benefits, Use Cases
Data privacy describes a set of principles and guidelines to ensure the respectful processing, protection, and handling of sensitive data linked to a person. This concept ties to who can define, observe, use, and control a person’s information and how. Typically, privacy spans two types of levels: implicit rules and written legislation. Implicit rules cover norms, behaviors, and values […]
What Is Data Security?
Data security describes the implementation of policies and procedures to ensure people and things take the right actions with data and information assets, even in the presence of malicious inputs. The right actions mean controlling and enabling data activity by balancing needs from: Stakeholders: Protect personal information while allowing access for legitimate transactions agreed upon […]
Cybersecurity in Cryptocurrency: Risks to Be Considered
Click to learn more about author Ben Hartwig. Blockchain has grown rapidly in recent years, but cryptocurrency is not immune to security attacks. There are still cybersecurity risks to be aware of. Some cryptocurrencies have already been the victim of ransomware attacks and other security breaches by hackers. ZenCash and Ethereum Classic have both lost […]
What’s the Difference Between a Data Breach and Identity Theft?
Click to learn more about author Ben Hartwig. The most revolutionary contributions to the modern world have been made by technology. Today, we cannot imagine a world without digitization and automation. However, where technology has made life quicker and more convenient for us, it has also produced an unfortunate byproduct — fraud. With people sharing […]
The Fundamentals of Data Anonymization and Protection
Click to learn more about author David Balaban. Data anonymization is a process aimed at eliminating personally identifiable clues so that it’s impracticable, or at least very challenging, to attribute this information to a specific individual. In this regard, the terms “de-identification” and “anonymization” denote virtually the same concept and may be used interchangeably. The […]
Big Data Security: Challenges and Solutions
Enterprises are using big data analytics to identify business opportunities, improve performance, and drive decision-making. Many big data tools are open source and not designed with security in mind. The huge increase in data consumption leads to many data security concerns. This article explains how to leverage the potential of big data while mitigating big […]
Data Privacy Day 2020: 5 Lessons From The Past To Better Secure The Future
A new press release reports, “This Data Privacy Day, we urge individuals and organisations around the world to learn from the fallout of the mega-breaches of the recent past. We provide five positive steps that companies around the world can take to better protect consumers, employees and more. Until recently, data privacy was only considered […]
Baffle Unveils Data Masking and Exfiltration Control to Mitigate Data Breach Risks
According to a recent press release, “Baffle Inc., an advanced data protection company, today released Baffle Data Masking and Exfiltration Control, the only masking and exfiltration solution that ties access control and usage to data-centric encryption, providing an end-to-end data protection solution. In addition to Baffle’s patented data protection that protects data in memory and […]