Topic "Data Security"

Data Theft – Would You Pay The Ransom?

At Deloitte’s Experience Analytics conference this year, there was an interesting and entertaining lab focussing on how to prepare for, and respond to, a data theft. The format was a simulation of a data breach scenario: We were asked to image that we worked for a fictitious European airline who was being blackmailed. The blackmailers... more

Trusted Customer Engagement with Data Governance and Privacy by Design

Customers today have high expectations. They expect organizations to provide relevant, timely and personalized offerings. These expectations have been shaped by the emergence of broad-scale customer-engagement transformation in recent years. Examples include organizations driving disruptive innovations in retail (Amazon), transportation (Uber), hospitality (Airbnb) and entertainment (Netflix). Along with these high expectations based on their needs,... more

Unified Intelligent Data Protection

The General Data Protection Regulation (GDPR) took center stage in 2018 and made data governance and data privacy and protection a common topic of discussion around the dinner table, on the nightly news, and on the front page of the paper, even for those outside of the IT “club.” Such focus on GDPR increased the... more

A New Dimension for Data Security Intelligence: Identity

Most organizations should leverage intelligent data security as a foundation for a systemic data privacy and protection program. Many market forces drive this need, including the chronic barrage of data losses, the enactment of powerful privacy regulations, consumers demanding the protection and control of their data, and the broad use of personal data to drive... more

The Kerberos Conundrum — A Proxy’s Plight

This post talks about the complexities that creep in when a Proxy Server is introduced into an environment using Kerberos mode of authentication and also a potential generic solution. Kerberos overview Kerberos is an authentication mechanism between a client and server on a network using symmetric keys and tickets. Kerberos mode ensures that a password is... more

Data Privacy and Protection Takes Center Stage

Businesses today are seeing a perfect storm of data privacy and protection, driven by unyielding forces centered around a customer’s private information. These forces include the chronic barrage of data breaches, the enactment of powerful privacy regulations and the growing consumer and citizen awareness of their rights to control their personal data. In this perfect... more

Masking Data on the Web (HTTP Masking)

One of the primary problems faced by Enterprises these days is “Data Security”. Below is a hypothetical conversation with a prospective customer who is on the lookout for a Data Masking solution that would work seamlessly as per their needs without amalgamating into their business logic. Customer: Our organization has lots of data and we need... more