Author: Protegrity
-
STRONGER CRYPTO ALGORITHMS ARE ON THE HORIZON
One of the biggest challenges surrounding digital technology is securing systems and data. For decades, computer scientists have developed increasingly sophisticated algorithms designed to encrypt data and protect it through frameworks such as public-key cryptography (PKE), which is also known as asymmetric cryptography. Today, these frameworks function relatively well. Billions of transactions and interactions use…
-
SEVEN CRITICAL TOOLS FOR BOOSTING DATA PROTECTION AND INNOVATION
The winds of change are gusting through the business world. More than a dozen state governments are crafting data compliance legislation, while Virginia recently passed a data privacy law mostly similar to California’s Consumer Privacy Act. This legislative flurry adds to a long list of established regulations such as GDPR, HIPAA, PCI DSS, and Sarbanes-Oxley.…
-
A DATA-CENTRIC APPROACH TO CLOUD
The biggest security problem with protecting data on a cloud is that there isn’t just one cloud. The typical enterprise has relationships with several cloud platforms, the official ones that IT approved as well as the shadow connections made outside of IT. Beyond that long list, however, a company has to contend with the hard…
-
DIGITAL VACCINE CERTIFICATES PRESENT OPPORTUNITIES AND CHALLENGES
As COVID-19 vaccine rollouts have accelerated and life inches back to some sense of normality, the call for digital vaccine certificates has grown. Governments, airlines, hotels, gyms, and sports and entertainment venues are all looking for ways to quickly and efficiently authenticate those who have been vaccinated. In Israel, individuals who are fully vaccinated can…
-
UNLOCK YOUR SENSITIVE DATA BY FIRST UNDERSTANDING THE DATA YOU HAVE
A business can’t manage or protect data it doesn’t know it has. Much like losing your keys in a messy house, data can easily get lost in on-premises systems. Getting a handle on data in a modern enterprise that relies on hybrid-cloud infrastructure is even more difficult; it’s like losing track of thousands of keys…
-
AS FACEBOOK HACK SHOWS, DATA PRIVACY IS GOOD FOR BUSINESS
More than 533 million Facebook users now have a concern more worrisome than the posting of an embarrassing photo or silly cat meme. Their personal information was stolen from the social media site and recently leaked on a popular hacker forum. The leak, which was first confirmed and reported by Insider, provides users’ full names,…
-
IT’S SCAMMER TIME! SIX TIPS TO KEEP YOUR DATA SAFE DURING TAX SEASON
What do financial scammers have in common with florists? Turns out, they both have busy seasons. For florists, it’s February 14th. For scammers, it’s April 15th (and, this year, May 15). Scammers exploit tax season because of its heightened urgency over financial compliance, which primes people to fall for hoaxes and phishing attacks and surrender…
-
PROTEGRITY TAKES THE GOLD IN THE 2021 CYBERSECURITY EXCELLENCE AWARDS
Protegrity isn’t competing in the upcoming Summer Olympics, but we’re proud to show off our gold “medal.” The Protegrity Data Protection Platform was recently named a gold winner of the 2021 Cybersecurity Excellence Awards for product excellence in data-centric security. The Cybersecurity Excellence Awards annually recognizes companies, products, and professionals that demonstrate excellence, innovation, and…
-
INTRODUCING THE PROTEGRITY PARTNER NETWORK
Today marks an important milestone for Protegrity, as we expand our commitment to our valued partners with the launch of the Protegrity Partner Network. As a foundational pillar of Protegrity’s growth and transformation strategy, the new program enables choice, control, and confidence when it comes to protecting sensitive data. This brand-new program has been uniquely…
-
CYBERCRIME NEVER ENDS; NOR SHOULD END-TO-END DATA PROTECTION
Recently discovered breaches of critical business and government infrastructure laid bare the inherent vulnerability of connected networks. In two separate incidents, hackers tied to Russia and China exploited the network monitoring software of the company SolarWinds to break into the computers of several U.S. government agencies and businesses. The breaches serve as a reminder of…