Category: Blogs

  • Collaboration: The Key Ingredient to Successful Security Compliance

    Integrating security and development processes In the fast-paced world of software development, the clash between developers and security experts could greatly benefit from some much-needed balance. On one side, developers strive for success based on metrics like delivery time, deployment frequency, and number of features. On the other side, security professionals are measured on vulnerability…

  • To the Left, To the Left

    Shifting left, reminiscent of Beyoncė’s famous song, Irreplaceable, is not just a passing trend but a fundamental shift in how we approach software development and security. Historically, security has often been an afterthought — a box to check once the software’s built. However, this reactive approach has proven inadequate in today’s cybersecurity landscape. What is…

  • Why Log4j Wasn’t the Developers’ Fault: Understanding the Challenges of Modern Developers

    In today’s fast-paced digital world, software developers face many challenges as they work tirelessly to create and maintain applications that power our daily lives. The recent Log4Shell vulnerability, which exposed a critical flaw in the widely used Log4j library, has drawn widespread attention and criticism. While it’s easy to point fingers at the developers for…

  • What Is Data in Motion?

    Data in motion, also known as data in transit, is the transmission of digital information from one location to another. This can include: Data in motion is just one of three data states, including data at rest and data in use.   How It Impacts You   Every day, you’re putting data in motion. From automatic cloud…

  • Overcoming US Regulatory Compliance Challenges with Borderless Data™

    In today’s age of rapidly increasing data collection, data privacy laws are becoming more prevalent than ever. The EU’s General Data Protection Regulation (GDPR) is considered the worldwide benchmark of data privacy law. While many countries have followed similar regulations, the United States does not have a GDPR equivalent.Instead of national standards and regulations, individual…

  • Moody’s Analytics Uses Protegrity Pseudonymization to Protect CID Data

    The data protection landscape is changing. The rapid adoption of cloud and software as a service (SaaS) greatly affects the financial industry, where many institutions rely on SaaS vendors for data protection previously implemented in-house. Moody’s Analytics relies on cloud service providers (CSPs) to adequately protect its data, showcasing the need for scalability, industry cost…

  • Secure Cross-Border Data Movement with Snowflake Encryption

    Organizations must constantly adapt to the challenges of maintaining compliance while handling data. Nowhere is that more apparent than cross-border data protection, which allows data to be and remain protected across jurisdictions, states, counties, and countries with the right data security tools. According to the United Nations, 137 of 197 of its members have data…

  • Explainer: Data Governance & You

    Welcome to the era of data domination! Every day, 2.5 quintillion bytes of data flood the digital landscape, estimates Forbes, with a whopping 90% of data created in just the last two years. While this growth presents many opportunities for organizations, it also introduces many challenges. That’s where data governance comes in. It’s a critical…

  • Frequently Asked Questions on the 2023 EU General Court’s Pseudonymised Data Ruling

    In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as…

  • Redefining Personal Data: Understanding the EU General Court’s Ruling on Pseudonymized Data

    In a ruling made on April 26, 2023, the General Court of the European Union (EU) made a groundbreaking decision changing the definition of personal data that has been in place since the adoption of the General Data Protection Regulation (GDPR). This ruling has significant data-sharing implications for organizations within the EU and enables them…