Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elliptic Curve Cryptography: An Introduction

The mathematical properties and concepts of elliptic curves are used in asymmetric key exchange cryptography schemes. Common applications include: In this article, we’ll take a deep dive into elliptic curve cryptography. We aim to take a digestible, slightly less academic look that still thoroughly explains this technical topic. For something a little lighter, explore our introduction to cryptography.

RFP Software vs. Security Questionnaire Automation

RFPs and security questionnaires make the world of sales and procurement go round. They’re both vital tools to help buyers assess potential relationships with vendors and ensure proper criteria are met before entering into any binding contracts. And while they serve an important role in the sales process, the burden they put on buyers and vendors alike has led to the creation of tools to streamline the process for all involved. Can you use a one-size-fits-all solution?

How Automated Identity Management Can Help Solve the Compliance Puzzle

Have you ever received a puzzle as a gift from a well-intentioned friend? They likely thought something along the lines of, “Hey, this person’s into solving problems — I bet they’d love putting together this bad boy on a rainy day.” The sentiment was spot-on. Puzzles are your thing.

The Explainer: Five Things To Know About Data Tokenization

Tokenization hides data. Sometimes data must be hidden in order to satisfy compliance requirements and customers’ expectations for data privacy. A form of data protection, tokenization conceals sensitive data elements so should an organization’s data be breached, the visible tokenized data—essentially a replacement for the valuable data—means nothing.A hacker will only see characters that are meaningless.

They're Not Just Long Words: Anonymization And Pseudonymization Protect Data-driven Business

Spelling, let alone pronouncing, “anonymization” and “pseudonymization” is just the beginning. Vocabulary, however, will be the least of the challenges for organizations that ignore the business value created through the use of these data protection methods. Anonymization and pseudonymization are two ways to de-identify sensitive data, and each has a distinct purpose in the tightrope balance between fully using and fully protecting data and data privacy.

What Is CCPA Compliance?

Today, privacy is an issue that has become more relevant than ever to individuals and businesses alike. As a result, many users are taking steps to protect their data. The California Consumer Privacy Act (CCPA) is a law that was enacted in order to provide greater protection and control over the personal information of California residents.

What is Encryption? How It Works and Its Benefits

Encryption technology is vital to securely sharing information over the internet. An estimated 1.145 trillion MB of data is created every day, and encryption prevents sensitive information from being intercepted, read or altered by the wrong recipients. Not sure what encryption is or how it works? Keep reading to learn more about data encryption, its purpose and benefits.