Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2023

The Explainer: Five Things To Know About Data Tokenization

Tokenization hides data. Sometimes data must be hidden in order to satisfy compliance requirements and customers’ expectations for data privacy. A form of data protection, tokenization conceals sensitive data elements so should an organization’s data be breached, the visible tokenized data—essentially a replacement for the valuable data—means nothing.A hacker will only see characters that are meaningless.

They're Not Just Long Words: Anonymization And Pseudonymization Protect Data-driven Business

Spelling, let alone pronouncing, “anonymization” and “pseudonymization” is just the beginning. Vocabulary, however, will be the least of the challenges for organizations that ignore the business value created through the use of these data protection methods. Anonymization and pseudonymization are two ways to de-identify sensitive data, and each has a distinct purpose in the tightrope balance between fully using and fully protecting data and data privacy.

Protegrity Wins 2021 Data Breakthrough Awards: "Data Security Solution Of The Year"

The results are in, and Protegrity has officially been named the “Data Security Solution of the Year” by the 2021 Data Breakthrough Awards. Data Breakthrough is an independent market intelligence organization that recognizes the top companies, technologies, and products in the global data technology market today.

What's The Difference Between Ach And Nacha?

If you work in a financial organization that operates in the US, you’ll have heard the phrases Nacha and ACH. Together, these entities affect many of the transactions you’re responsible for — and dictate how, why, and when your business accesses sensitive data. But, what exactly are they? And, what’s the difference between the two? Read on to find out.

One Cybersecurity Platform To Rule Them All: Exploring The One Architecture

Enterprises require multiple tools for cyber defense, so network and information security staff often end up managing a patchwork of solutions, a blend of legacy and new technologies. If they find and deploy solutions that solve several business and security problems at once, they can reduce costs, logistics, and headaches while helping the business grow and innovate.