6 Things Every Big Data Security Solution Needs

As data-centric security gain mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are faced with choosing a solution from an increasing array of options. However, not all solutions that claim … Continue reading 6 Things Every Big Data Security Solution Needs

How Artificial Intelligence will Affect Patient Data Protection

Following the successful introduction of Alexa’s healthcare services earlier this year, Amazon has announced that its AI, Textract, is now HIPAA eligible. Textract offers a machine learning service that scans healthcare-related texts and dat… Continue reading How Artificial Intelligence will Affect Patient Data Protection

Big Data Security Series Part 3: How to Run Analytics on Protected Data

In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA environments. So how can we protect data in these complex environments and be compliant? How can… Continue reading Big Data Security Series Part 3: How to Run Analytics on Protected Data

Big Data Security Series Part 2: How Hard is it to Secure Big Data?

Survey says: exceedingly difficult.
But why?
The post Big Data Security Series Part 2: How Hard is it to Secure Big Data? appeared first on Security Boulevard.
Continue reading Big Data Security Series Part 2: How Hard is it to Secure Big Data?

CCPA:  Data Privacy like GDPR; Data Security like PCI DSS

Comparisons have already been drawn about the California Consumer Privacy Act (CCPA), calling it ‘the GDPR for California residents.’ However, drawing comparisons to PCI DSS as the title suggests may cause some eyebrows to raise. Prote… Continue reading CCPA:  Data Privacy like GDPR; Data Security like PCI DSS

6 takeaways from the Capital One data breach

“WHAT’S IN YOUR WALLET?” is the theme question asked by spokes-celebrity Jennifer Garner in commercials for Capital One. A data breach wasn’t supposed to be one of the things in your wallet but since it was, the company’s brand is taking a huge hi… Continue reading 6 takeaways from the Capital One data breach

The Difference Between Format-Preserving Encryption and Tokenization

There is a lot of confusion surrounding this topic and, given recent developments such as the ANSI X9 standard for retail financial services, tokenization can actually be implemented with format-preserving encryption (FPE). In the end, both achiev… Continue reading The Difference Between Format-Preserving Encryption and Tokenization

A Torrid Affair: Data Analytics and Data Protection

Friends with Benefits or Deadlocked Foes?
With the rapid expansion of data analytics frameworks and technologies, the ability to mine and gain customer insights from datasets has never been easier. Creative analytics are used to power everything f… Continue reading A Torrid Affair: Data Analytics and Data Protection

How to End the Tug of War Between Data Analytics and Data Security

Data analysts want access to large volumes of data because, generally speaking, the bigger the sample size, the more accurate the predictions. One of the biggest thorns in the side of data analysts is when your organization has a big fat set of da… Continue reading How to End the Tug of War Between Data Analytics and Data Security

Is FedRAMP Criticism Fair?

Although FedRAMP has recently been criticized for lacking clarity and efficacy, any attempt to reduce risk to information in the cloud should be considered worthy in the face of increasing cybersecurity threats.
The post Is FedRAMP Criticism Fair? appe… Continue reading Is FedRAMP Criticism Fair?