Advertisement

The Aftermath of a Data Breach

For organizations, the aftermath of a data breach can be highly devastating. In an interconnected world, a single data vulnerability can cascade into decades of irreversible loss – intellectual, monetary, and reputational. The consequences paralyze even the most established businesses, uprooting them from their foundation.  A classic example is that of a Delaware corporation, Blackbaud, […]

What Is Data Privacy? Definition, Benefits, Use Cases

Data privacy describes a set of principles and guidelines to ensure the respectful processing, protection, and handling of sensitive data linked to a person. This concept ties to who can define, observe, use, and control a person’s information and how. Typically, privacy spans two types of levels: implicit rules and written legislation. Implicit rules cover norms, behaviors, and values […]

What Is Data Security?

Data security describes the implementation of policies and procedures to ensure people and things take the right actions with data and information assets, even in the presence of malicious inputs. The right actions mean controlling and enabling data activity by balancing needs from: Stakeholders: Protect personal information while allowing access for legitimate transactions agreed upon […]

Cybersecurity in Cryptocurrency: Risks to Be Considered

Click to learn more about author Ben Hartwig. Blockchain has grown rapidly in recent years, but cryptocurrency is not immune to security attacks. There are still cybersecurity risks to be aware of. Some cryptocurrencies have already been the victim of ransomware attacks and other security breaches by hackers. ZenCash and Ethereum Classic have both lost […]

The Fundamentals of Data Anonymization and Protection

Click to learn more about author David Balaban. Data anonymization is a process aimed at eliminating personally identifiable clues so that it’s impracticable, or at least very challenging, to attribute this information to a specific individual. In this regard, the terms “de-identification” and “anonymization” denote virtually the same concept and may be used interchangeably. The […]

Big Data Security: Challenges and Solutions

Enterprises are using big data analytics to identify business opportunities, improve performance, and drive decision-making. Many big data tools are open source and not designed with security in mind. The huge increase in data consumption leads to many data security concerns. This article explains how to leverage the potential of big data while mitigating big […]

Baffle Unveils Data Masking and Exfiltration Control to Mitigate Data Breach Risks

According to a recent press release, “Baffle Inc., an advanced data protection company, today released Baffle Data Masking and Exfiltration Control, the only masking and exfiltration solution that ties access control and usage to data-centric encryption, providing an end-to-end data protection solution. In addition to Baffle’s patented data protection that protects data in memory and […]