How do you Protect Sensitive Data in the Cloud?

We are living in the age of data. Every business processes at least some data with varying degrees of complexity, in one way or another, however, despite the rising importance of data, we are not really seeing a proportional increase in data secu… Continue reading How do you Protect Sensitive Data in the Cloud?

Comforte Inc. Announces New Partnership with Logic20/20

New York, New York – 15 July 2021 – Enterprise data security experts comforte Inc. have announced a new partnership with Seattle-based business and technology consulting firm Logic20/20.
The post Comforte Inc. Announces New Partnership with Logic2… Continue reading Comforte Inc. Announces New Partnership with Logic20/20

Balancing Agility with Data Security

Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and … Continue reading Balancing Agility with Data Security

The Verizon Data Breach Investigation Report – How do you Use it?

The annual Verizon DBIR (Data Breach Investigation Report) is a great tool full of lots of actionable information. However, at over 100 pages full of detailed information, it can seem a bit like walking into a modern hardware store and wondering w… Continue reading The Verizon Data Breach Investigation Report – How do you Use it?

New Nacha Data Security Requirements Coming up

The National Clearing House Association (Nacha) is a non-profit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through the … Continue reading New Nacha Data Security Requirements Coming up

A Company Culture of Data Privacy – Your Role as a Data Caretaker

The big cloud service providers—think Amazon Web Services, Microsoft, and Google—are very clear about the shared responsibility model. If you distill out of it all the nuances and variables, this model comes down to a single fact: the cloud provid… Continue reading A Company Culture of Data Privacy – Your Role as a Data Caretaker

How Secret Isolation Affects Your Data Security Mechanisms?

When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to protect personal information from unauthorized access. Encryption is a highly touted means of securit… Continue reading How Secret Isolation Affects Your Data Security Mechanisms?