Category: Blogs
-
Coast Capital Savings Credit Union: Meeting Canadian Regulatory Standards for Compliance with Protegrity
One of Canada’s largest credit unions, Coast Capital Savings Credit Union (CSS), with over 50 branches across the country, needed to protect critical PII data stored in their AWS cloud environments, Amazon Redshift, AWS EMR, and AWS S3. CSS had to meet Canadian regulatory standards for compliance in 2021, including the Personal Information Electronic Documents…
-
Privacy is Power: The Value of Training for Modern Data Protection
We’ve all seen it in the movies: The chief of security declares that no one could ever steal the “Famous Jewel” because it’s protected by thick glass, an impenetrable system of motion-detecting lasers, and, finally, a weight-sensitive sensor. Cut to the next scene, where a thief, dressed in sleek black, zip-lines from an open skylight,…
-
2023 DATA PRIVACY LAWS YOU NEED TO KNOW: CROSS-BORDER AND BEYOND
INTERNATIONAL DATA PRIVACY REGULATIONS In 2023, an estimated five quintillion bytes of data will be created daily. While this data revolution is exciting, it also raises questions about data privacy. In response to that challenge, more regions, localities, and countries will implement additional data privacy laws in the coming years to ensure the safety of…
-
A HITCHHIKERS GUIDE TO CROSS-BORDER DATA PROTECTION
Imagine doing business in a bubble. You are an international company only allowed to make decisions using data collected within your country and by your business unit (BU). You also cannot share data with subsidiaries or third parties. It would be challenging to conduct day-to-day business, let alone innovate and grow. Fortunately, this isn’t the…
-
PROTEGRITY WINS 2021 DATA BREAKTHROUGH AWARDS: “DATA SECURITY SOLUTION OF THE YEAR”
The results are in, and Protegrity has officially been named the “Data Security Solution of the Year” by the 2021 Data Breakthrough Awards. Data Breakthrough is an independent market intelligence organization that recognizes the top companies, technologies, and products in the global data technology market today. The Data Breakthrough Awards program provides a forum for…
-
THE EXPLAINER: DYNAMIC DATA MASKING AND MONITORING
1. Dynamic Data Masking Cloaks Data As the name implies, dynamic data masking actually masks data. Just as protective masks have obscured people’s smiles (and frowns) during the pandemic, this data-protection method covers sensitive data. People who shouldn’t see the data won’t see it. 2. It Doesn’t Alter Data; It Simply Protects it Also known…
-
DATA TOKENIZATION EXPLAINED: 5 BASIC PRINCIPLES OF TOKENIZATION
WHAT IS DATA TOKENIZATION? Data tokenization protects sensitive data by substituting it with a randomly generated surrogate value known as a token. There are two types of data tokenization: vault and vaultless. Vault data tokenization stores information about tokenized data in a database, while vaultless generates tokens with algorithms to prevent easy access. Learn more…
-
2 DATA PROTECTION METHODS YOU NEED TO KNOW: ANONYMIZATION AND PSEUDONYMIZATION
WHAT IS ANONYMIZATION AND PSEUDONYMIZATION? ANONYMIZATION \ Ə-ˌNÄ-NƏ-MƏ-ˈZĀ-SHƏN PSEUDONYMIZATION \ SO͞ODƏNIMƏ-ˈZĀ-SHƏN Spelling, let alone pronouncing, “anonymization” and “pseudonymization” is just the beginning. Vocabulary, however, will be the least of the challenges for organizations that ignore the business value created through the use of these data protection methods. The amount of data keeps increasing, exponentially, and it moves quickly…
-
ACH vs. Nacha: What You Need to Know
If you work in a financial organization that operates in the US, you’ll have heard the phrases Nacha and ACH. Together, these entities affect many of the transactions you’re responsible for — and dictate how, why, and when your business accesses sensitive data. But, what exactly are they? And, what’s the difference between the two?…
-
ONE CYBERSECURITY PLATFORM TO RULE THEM ALL: EXPLORING THE ONE ARCHITECTURE
Enterprises require multiple tools for cyber defense, so network and information security staff often end up managing a patchwork of solutions, a blend of legacy and new technologies. If they find and deploy solutions that solve several business and security problems at once, they can reduce costs, logistics, and headaches while helping the business grow…