Protegrity Blog

Top 10 Protegrity Blog Posts of 2017

Author : Michael Maloney

Protegrity Blog

We would like to think that Protegrity upped its blogging game in 2017, writing about a wider variety of topics of interest to data security professionals than we have in the past. From GDPR to AWS to privacy, here’s a look back at the top 10 most popular Protegrity blog posts of 2017.

1) Pseudonymization vs. Anonymization and How They Help with GDPR: Pseudonymization and Anonymization are two distinct terms that are often confused in the data security world. With the advent of GDPR, it is important to understand the difference, since anonymized data and pseudonymized data fall under very different categories in the regulation.

2) Bankers Have Work to Do to Respond to FinTech Challengers: There are numerous challenges for incumbent financial services organizations, but there are also opportunities. Winning financial institutions use things like data security to gain the upper hand and as an advantage over the emerging competition.

3) Data Security Today is Broken. Imagine if it Just Worked.: To highlight Protegrity’s data-centric approach to security that protects the data itself, regardless of where it is stored or consumed, we created an infographic that explains how to avoid the pitfalls of silo-based approaches to data security.

4) Protecting Data in AWS? Start with S3: It makes business sense to use native protection with Amazon S3, but add to that the ability to directly protect data within S3, using fine-grained data protection. In other words, if hackers break into Amazon, they do not get your data.

5) Are Your Forecourt Retail Customers Consenting Adults?: Forecourt retailers (a.k.a. gas station convenience stores) need to take steps to protect the identifiable information customers are creating, not just to ensure compliance but also to ensure trust and gain a competitive edge.

6) 5 Takeaways from The Privacy Engineer’s Manifesto: In this blog post, we provide some lessons learned from the book, The Privacy Engineer’s Manifesto, co-written by Michelle Dennedy, Cisco’s Chief Privacy Officer. We believe the book’s insights are of value to everyone involved in the data supply chain, from practitioners to business users and especially those in data security and governance.

7) Silos: What Causes Them and How to Overcome Them: Silos are barriers that exist between departments within an organization, causing people who are supposed to be on the same team to work against one another. This blog post looks at how silos were created and how we can overcome them going forward.

8) Travis Wright on the Data Privacy Syndrome: Does GDPR + HR = Impending Doom? Guest blogger Travis Wright says there are huge GDPR implications for every company that employs European people. This means that HR professionals must know what sensitive data is where, and must protect it in order to comply. This requires insight and technical capability that is seldom found within the people-centric HR world.

9) Data Protection, Data Security and GDPR Top of Mind at Teradata Universe: Conversations the Protegrity team had with attendees of Teradata Universe in Nice, France, proved that data protection, data security and GDPR are amongst the key challenges faced by organizations around the world.

10) RSA Conference — Seven Key Takeaways from Day Three: Privacy mattered to the attendees of this past year’s RSA Conference, as visitors to our booth wanted to learn more about centrally managing and protecting data across all silos. Much was also made of the business case for security in terms of privacy and trust as a competitive advantage.

Bonus Blogs:

While all the top blog posts mentioned above were written in 2017, a few older posts continue to generate significant interest from visitors to our blog. These “oldies but goodies” were still among the most read posts during 2017.

What is the Difference between Tokenization and Encryption? (from October 2016): More organizations are moving from encryption to tokenization, recognizing that it is a more secure, flexible and cost-effective approach to data security. Tokenization goes well beyond simply reducing the burden of PCI compliance, to being the best way to protect all private or sensitive data, unlock business value and minimize risk in every scenario including GDPR and HIPAA.

9 Critical GDPR Questions Answered by 3 Data Privacy & Security Experts (from June 2016): This blog post summarized the responses given by data privacy and security experts to questions asked during a webinar about pending GDPR requirements.

Differences between Vault-Based Tokenization and Vaultless Tokenization (from February 2012): This oldie but goodie describes some of the advantages Vaultless Tokenization has over Vault-based Tokenization.

Energy and Utilities Industry Cannot Afford Slow Response to GDPR (from June 2016): It is essential that leaders in the Energy & Utilities industry understand that GDPR enshrines in law the principles of Privacy by Design and seek stakeholders and qualified IT professionals with the expertise required to overcome the logistical and technical implications of its requirements by 28 May 2018. The regulation suggests pseudonymisation as an approach to best meet its demands.

Thanks to all our readers for your support of this blog during 2017. Let us know what your favorite post was this year and what you would like us to write about in 2018.

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe Now



Subscribe Now

Oops! We could not locate your form.