Protegrity Blog

12 Global Data Protection Trends Keeping CEOs More Secure

Author : Raajveer Loyal
Comment : 5847
As cyber-security breaches increase in frequency and severity year on year, CEO’s could soon serve prison terms if an employee from his or her organ ...
Read More

Practical Amazon S3 Encryption and Beyond

Author : Adrian Lane
Comment : 5847
With the recent news about data breaches from Amazon S3 buckets, largely resulting from customer mis-configuring their environment, we thought it woul ...
Read More

Encrypting Data-at-Rest In Pivotal Greenplum With Protegrity

Author : protegrity
Comment : 5847
The following blog post, written by Scott Kahler and Ian Redzic of Pivotal Software, originally appeared here. It is reprinted here with their permiss ...
Read More

The Role of Standards in Rapidly Changing Markets (like Data Security)

Author : protegrity
Comment : 5847
Last week, NIST announced that it approved a format-preserving encryption (FPE) standard for FPE. The recommendation includes two different methods f ...
Read More

Going Beyond Native Teradata Security Controls

Author : protegrity
Comment : 5847
Teradata Integrated Data Warehouse includes a wealth of built-in data security tools, including authentication, authorization and access controls, aud ...
Read More

Teradata Partners Conference Q&A

Author : protegrity
Comment : 5847
Teradata Partners Conference Q&A At the Teradata Partners Conference 2015 in Anaheim, Protegrity held multiple open forums to ask questions about data ...
Read More

Protegrity Discusses Big Data Security with MapR at Strata, San Jose

Author : protegrity
Comment : 5847
Protegrity data security experts Venkat Vempati and Marco Carmona recently met up with our partner company MapR to discuss Big Data Security at Strata ...
Read More

Controlling the (Heart)Bleeding

Author : protegrity
Comment : 5847
Recently, a bug was discovered in the OpenSSL protocol, now dubbed “Heartbleed”, that leaves much of the internet and many IT systems seriously su ...
Read More

How Data Security Tips the Scales in Privilege vs. Protection

Author : protegrity
Comment : 5847
In his recent blog post on ZDNet, Larry Seltzer exposed the current issues with excess privileges in many organizations. Most importantly, how the pr ...
Read More

Another Look at 5 Myths of Encrypting and Tokenizing Sensitive Data

Author : protegrity
Comment : 5847
In a recent article on CSO Online, Dave Kilgallon reviewed five common myths of encrypting and tokenizing sensitive data, and the misunderstandings th ...
Read More

Download our Latest Insights

Secrets of Cloud Data Security

Categories

Subscribe Now

Archives