The Revised Swiss Data Protection Act (revDSG) – What you Need to Know

Data privacy and security is a global issue that is continually evolving to meet the current demands of citizens. As such, revisions are always being made to regulations and laws to modernize them so that they are effective in the present day. In … Continue reading The Revised Swiss Data Protection Act (revDSG) – What you Need to Know

How to Get your Data-Centric Security Project off the Ground

Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes, especially concerning the many demands of modern regulations and rising customer expectations. The no… Continue reading How to Get your Data-Centric Security Project off the Ground

Experts Discuss: Where Data Security and Data Privacy Meet

A few weeks ago, comforte AG  hosted an online webinar featuring Forrester. The focus of that presentation was the intersection point between data privacy and data security. The overall goal was to emphasize the impact on businesses large and… Continue reading Experts Discuss: Where Data Security and Data Privacy Meet

6 Things Every Big Data Security Solution Needs

As data-centric security gain mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are faced with choosing a solution from an increasing array of options. However, not all solutions that claim … Continue reading 6 Things Every Big Data Security Solution Needs

Rogue Staff Member at Leading Cybersecurity Company Leaks Customer Data

It’s always an unfortunate occurrence when a company gets hit by a cyberattack. When a cybersecurity company gets breached, then the alarm bells should certainly start to ring. 
The post Rogue Staff Member at Leading Cybersecurity Company Lea… Continue reading Rogue Staff Member at Leading Cybersecurity Company Leaks Customer Data

Big Data Security Series Part 3: How to Run Analytics on Protected Data

In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA environments. So how can we protect data in these complex environments and be compliant? How can… Continue reading Big Data Security Series Part 3: How to Run Analytics on Protected Data

Big Data Security Series Part 2: How Hard is it to Secure Big Data?

Survey says: exceedingly difficult.
But why?
The post Big Data Security Series Part 2: How Hard is it to Secure Big Data? appeared first on Security Boulevard.
Continue reading Big Data Security Series Part 2: How Hard is it to Secure Big Data?