Protegrity Blog

The Importance of Cyber-security in the world of Telecommunications

Author : Raajveer Loyal
Comment : 2694
When it comes to cybersecurity the telecommunications sector is widely viewed as one of the most vulnerable to cyber security attacks.  According to ...
Read More

Data Erasure & The Right to be Forgotten

Author : Raajveer Loyal
Comment : 2694
The ‘right to be forgotten’ is a legal concept that is fast evolving in the European Union (EU) that could eventually find its way to the US feder ...
Read More

The introduction of GDPR, one year on…

Author : Raajveer Loyal
Comment : 2694
Recently the E.U celebrated the first-year anniversary of the introduction of the General Data Protection Regulation. It is widely regarded as the mos ...
Read More

12 Global Data Protection Trends Keeping CEOs More Secure

Author : Raajveer Loyal
Comment : 2694
As cyber-security breaches increase in frequency and severity year on year, CEO’s could soon serve prison terms if an employee from his or her organ ...
Read More

Building a Secure Cloud Data Lake with AWS, Protegrity and Talend

Author : Sunil Sabat
Comment : 2694
The Rise of the Cloud Data Lake By now, you already know that cloud computing is rapidly changing the landscape of IT and brings many business benefi ...
Read More

Going Beyond Native Teradata Security Controls

Author : protegrity
Comment : 2694
Teradata Integrated Data Warehouse includes a wealth of built-in data security tools, including authentication, authorization and access controls, aud ...
Read More

De-Identifying Sensitive Data to Enable Analytics

Author : protegrity
Comment : 2694
Compliance issues can often complicate data analytics by introducing levels of complexity in how the data can be accessed, referenced or joined. What ...
Read More

Teradata Partners Conference Q&A

Author : protegrity
Comment : 2694
Teradata Partners Conference Q&A At the Teradata Partners Conference 2015 in Anaheim, Protegrity held multiple open forums to ask questions about data ...
Read More

Download our Latest Insights

Secrets of Cloud Data Security

Categories

Subscribe Now

Archives