When it comes to cybersecurity, some enterprises still take it with a grain of salt. But make no mistake about it: No one is safe. Companies such as BBC made it into the list of victims of the most significant data breaches in 2023, contributing to a staggering 5.3 billion total breached records. So, it’s safe […]
How Encryption Works to Preserve Data Privacy
Cryptography and privacy go hand in hand: Leveraging cryptography to encrypt data for the purposes of preserving privacy isn’t a new concept. In fact, data encryption itself is quite easy. The far greater challenge is data decryption – or, put another way, making sure that encryption doesn’t get in the way of collaboration. After all, data is only […]
Edge Computing: An Overview
Edge computing (EC) allows data generated by the Internet of Things (IoT) to be processed near its source, rather than sending the data great distances, to data centers or a cloud. More specifically, edge computing uses a network of micro-data stations to process or store the data locally, within a range of 100 square feet. […]
‘Tis the Season to Be Wary
‘Tis the season to be jolly. By now, those words from the familiar holiday tune “Deck the Halls” are echoing in malls across the U.S. But the retailers that fill those particular halls with yuletide treasures should be thinking, “‘Tis the season to be wary.” With the holiday shopping season in full swing, December is […]
3 Things You Should Do to Protect Your Consumers’ PII in a Contactless World
Click to learn more about author Deepak Gupta. What if you could go to a coffee shop, have your phone charged, and pay without taking your phone out of your pocket? What if you could quickly pay without handing out cash while waiting in line at the cinema or the bus station? Or drive up […]
The Solution to Overcoming Cyber Threats in a 5G World and Beyond
Click to learn more about author Michael Abad-Santos. As 5G networks continue to roll out worldwide, the looming question of how we can overcome cyber threats continues to elude even the experts. In fact, it is for this very reason the National Security Agency (NSA) released unclassified 5G security guidance, which includes Potential Threat Vectors to 5G […]
Overcoming Common Data Privacy and Security Challenges in the Cloud
Click to learn more about author Tejasvi Addagada. A recent survey of C-suite, information technology, and artificial intelligence practitioners offers interesting insights on the enablement of digital capabilities using cloud-based data capabilities. For instance, 68% of IT practitioners said they are using the cloud to store most of their data. Other insights include the planning by the C-level […]
Privacy Laws and Regulations: Where Does Encryption Apply?
Click to learn more about author Muhammad Hamza Shahid. The importance of data is increasing on scales never seen before, becoming one of the most precious assets for organizations worldwide. Various privacy laws and regulations have compelled companies to store and keep their consumers’ data secure as much as possible. The latest research by IDC […]
The Fundamentals of Data Anonymization and Protection
Click to learn more about author David Balaban. Data anonymization is a process aimed at eliminating personally identifiable clues so that it’s impracticable, or at least very challenging, to attribute this information to a specific individual. In this regard, the terms “de-identification” and “anonymization” denote virtually the same concept and may be used interchangeably. The […]
Responding to Big Data Breaches: Best Practices
Click here to learn more about Gilad David Maayan. On average, every data breach affects about 25,000 records and costs the affected organization almost $4 million. This cost comes in the form of brand damage, loss of customer trust, and regulatory fines. As data increases, so does your liability should a breach occur. More data […]