Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Cut PCI DSS Scope and Eliminate Compliance Costs

Securing PCI and PII data is at the core of what we do at Protegrity. You can try out Protegrity’s capabilities today, through our API Playground. This section walks you through some sample scenarios of de-identifying PCI data, so that it is removed from your environment and only reversed once it leaves it. To run this example, you have to be signed up to the Protegrity API Playground.

Secure E-Commerce Marketing: Protecting Customer Data While Driving Sales

In today's digital age, e-commerce businesses are flourishing, providing immense opportunities for entrepreneurs and established companies alike to grow their online presence. With this growth, however, comes an increased responsibility to protect customer data. Online businesses are tasked not only with offering high-quality products and services but also ensuring that their marketing strategies are secure, transparent, and in compliance with data protection regulations.

Monitor Azure data protection services with Datadog

Azure Backup Vault, Azure Recovery Services Vault, and Azure Site Recovery make up Microsoft’s core suite of data protection and disaster recovery services. Azure’s vaults enable customers to store backups of entire Azure VMs, on-premise workloads, and workloads from Azure services such as Azure SQL Database, Azure Blob, and Azure Database for PostgreSQL. Azure Site Recovery integrates with Azure Recovery Services Vault to extend its backup services to support disaster recovery.

Managing shadow AI: best practices for enterprise security

The rush to work faster with artificial intelligence (AI) risks encouraging employees to accidentally put sensitive data at risk. Take this scenario: someone in the procurement team has a tight deadline, so they upload a confidential contract into an AI tool to review a few redlines. It’s unclear if the AI system is storing the data from the contract, how long it’ll be retained, and if the data will resurface in a future prompt to someone else.

Secure employee offboarding isn't happening fast enough to prevent employee data theft

Departing workers can pose significant risks to data. Let me share a story about an individual who stole and deleted valuable research data right before submitting his resignation: six weeks after a contingent worker left the company, the FBI contacted us. It turned out that the individual had tried to sell the company’s confidential data to a third party. When he left, everything seemed normal.

How CISOs can justify their cybersecurity budget

Every year, companies reevaluate their budgets, making tough calls on where to invest for the most impact. In many organizations, cybersecurity spending is often seen as a cost center. However, without adequate security investments, companies put themselves at greater risk for data breaches that could disrupt business operations and damage customer trust, ultimately costing the company a lot more in the end.

How cert pinning and E2EE broke your CASB - and why endpoint is the new cloud control point

Cloud adoption among enterprises accelerated around 10 years ago. During this time, network-based tools emerged as solutions that could protect data as it traveled to the cloud. These solutions, including Security Service Edge (SSE) and Cloud Access Security Brokers (CASB), utilized network-based proxy architectures that could intercept and control traffic.