E-mail:
Password:
Register | Help

Latest Publications

'Massive' switch to new credit cards ahead   (2014-10-23)
Security jobs are hot, thanks to the Internet of things   (2014-10-23)
Staples Is Latest Retailer Hit by Hackers   (2014-10-23)
How effective is cloud-provided encryption?   (2014-10-22)
PCI Compliance Under Scrutiny Following Big Data Breaches   (2014-10-22)
Cybersecurity becomes a top priority after data breaches   (2014-10-21)
Itís time to get paranoid when it comes to your data   (2014-10-21)
PCI security council welcomes Obama executive order on EMV   (2014-10-21)
Data Protection Concerns Hinder Innovation?   (2014-10-20)
A Free Retina Scan with Your Purchase?   (2014-10-17)
Intel preps new technology to secure credit card transactions   (2014-10-17)
Mainframe security best practices for compliance with PCI DSS   (2014-10-17)
Kmart Latest Retail Chain to Disclose Payment Card Breach   (2014-10-16)
Big data and privacy: Isn't it really a debate about trust? -- Strata + Hadoop 2014   (2014-10-16)
Data encryption startup says high profile cloud breaches highlight growing importance of privacy   (2014-10-16)
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 5)   (2014-10-16)
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 4)   (2014-10-15)
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 3)   (2014-10-15)
Kmart breach likely exposed payment card data   (2014-10-15)
Expert eye: Ensure data security with integrated approach, by John Volanthen   (2014-10-15)

View more

Categories

Security jobs Internet of things IoT Staples Retailer Hackers NYT NY Times NYTimes Cloud gateways regulatory compliance encryption concerns icloud scmagazine PCI Compliance Data Breaches Home Depot Cybersecurity data breaches Breaches JP Morgan Banks malware tokenization PCI security council Obama executive order EMV Data Protection Innovation Target Security Breach biometric retina password google mobile Information Encrypted tokenization payment Intel Target malware breach software hardware chip PCI technology secure credit card transactions Mainframe tokenization breach security best practices compliance PCI DSS Kmart tokenization Data centric Hackers Breached Payment SEARS Big data privacy trust Strata Hadoop Thought Leader BigData Privacy Hadoop Data Security Analytics crisis cloudera tokenization Cloudera Avatar BigData Privacy Hadoop Data Security Analytics crisis cloudera tokenization Hortonworks Teradata Cloud gateways regulatory compliance encryption concerns icloud BigData Privacy Hadoop Data Security Analytics crisis cloudera tokenization Forbes Kmart tokenization Data centric Hackers Breached Payment SEARS BankInfoSecurity QSA Cloud gateways regulatory compliance encryption concerns icloud CIO Breache Tokenization JP Morgan Security Wall Street Big Data Security Think Tank Celebrity photo leaks cloud security issues CYBERTHIEVES ATTACK K-MART DAIRY QUEEN securing enterprise data computerworld Kmart Hackers Breached Payment SEARS WSJ Hackers Fidelity Sears Kmart data breach Hackers K-Mart Kmart Hackers Breached Payment Celebrity Photos Leak Cloud Security gateway tokenization MBIA Breach Security Ops tokenization skills Breaches JP Morgan Banks malware tokenization monitoring CEO Tokenization JP Morgan Security Wall Street Big Data Cloud Data Governance Risk Management Compliance CyberSecurity tokenization AtT cybersecurity threats inside encryption tokenization monitoring ATT data breach insider Cloud Data Governance Risk Management Compliance NY Metro NYC CyberSecurity Conference Tokenization Apple Visa Mastercard Mobile Payment credit card Breach ATT tokenization monitoring ATT data breach Cyber Insurance Policies CISO Target Home Deport breaches Breaches JP Morgan Banks malware tokenization forbes Breaches JP Morgan Banks malware tokenization monitoring russia Breaches JP Morgan Banks malware tokenization monitoring Fortune Celebrity Photos Leak Cloud Security Breaches JP Morgan Banks malware tokenization USATODAY Breaches JP Morgan Banks malware tokenization monitoring ABC Breaches JP Morgan Banks malware tokenization monitoring cyberattack NYT Breaches JP Morgan Banks tokenization monitoring Breaches JP Morgan Banks malware tokenization monitoring Data Encryption tokenization Privacy CIA Target Security Breach PIN Information Encrypted tokenization payment Shellshock Bug Heartbleed Home Depot breach Malware FBI Apple Android Phones FBI Data Breach Healthcare Bash shellshock Home Depot breach Malware Target tokenization encryption FBI Smartphone Security VIATOUR BREACH ENCRYPTED PAYMENT CARD INFORMATION EXPOSED Breaches TripAdvisor Payment Card Data Breach BigData Privacy Hadoop Data Security Analytics crisis cloudera tokenization Cyber Security Home Depot breach Malware voltage forbes Home Depot breach Malware voltage Home Depots PR problems dwarfed by Target breach Home Depot breach Malware voltage Moneywatch: Home Depot data breach Home Depot breach Malware voltage eWeek Home Depot breach Malware voltage NYT New york Times Home Depot breach Malware voltage NASDAQ Home Depot breach Malware voltage wsj Home Depot breach Malware voltage Atlanta Home Depot breach Malware voltage# Home Depot breach Malware voltage tokenization malware PCI-DSS retail security encryption epidemic medical identity theft usatoday medical identity theft epidemic Cloud gateways regulatory compliance encryption concerns responsible oracle database Celebrity Hack Exposes Cloud Risk Healthcare Security Breach Lawmakers PCI SSC PCI DSS 3.0 compliance merchants CSA InfraGard ISACA ISC2 ISSA OWASP Practical Advice Cloud Data Security Oracle NYOUG iCloud Photo Thefts Apple Cloud Data Storage Hackers Break HealthCare.gov security firewall Home Depot POS Malware Victim FT Market watchdog cyber attack JP Morgan Target risk privacy breach cloud computing Yahoo CBS Hackers Home Depot NBC CNBC malware PCI iCloud Apple Data Breach Hacking Celebrity Photos Forbes iPhone iCloud Breaches JP Morgan Banks UCard malware tokenization encryption Cloud gateways regulatory compliance encryption concerns icloud Apple iPhone Oracle NYC NYOUG Cloud Security coordination cyber attacks India Patient Data Risk. Security Breach security risk health practices Threat Security Tokenization IoT Internet of Things enterprise BigData Privacy Hadoop Data Security Analytics crisis india Breaches JP Morgan Banks Cloud gateways regulatory compliance encryption concerns responsible CHS Breach. Health Care Security Illness Researchers malware steals Gmail password online banking data Security IoT Internet of Things cloud big data tokenization MASTERCARD TOKEN PCI payment mobile security PAYMENTS tokenization standard CYBER THREAT Data Breach attack encryption tokenization UPS malware Breach account Security encryption tokenization data UPS hacked Supervalu Data Breach tokenization security Security Researchers Supervalu PoS Breach Avoidable Cloud gateways regulatory compliance encryption concerns security tokenization supermarket chains Supervalu Acquisition breaches Supervalu Data Breach nasdaq tokenization security Data Breach attack encryption tokenization password malware P.F. Changs Russian data breaches Lesson security tokenization Cloud gateways regulatory compliance encryption Cyber Trends Security Data Security tokenization IoT Internet of Things data security plan BigData Privacy Hadoop Data Security Analytics crisis legislation Market Research Big Data BigData Privacy Hadoop Data Security Analytics crisis government BigData Privacy Hadoop Data Security Analytics crisis board Threat Security Tokenization IoT Internet of Things Russian data breach security billion passwords tokenization malware PCI-DSS retail security Russian CIO data breach security conference billion passwords Target Shares Retailer Cost Data breach eBay eWeek Forbes Cybersecurity security audits tokenization Target breachesprofessionalized NYT Russian breach hack Internet Passwords Russian data breach security conference billion passwords Security Cloud Mobile Big Data BigData Privacy Hadoop Data Security Analytics crisis PF Chang restaurants customer data stolen Breach account Security encryption tokenization data Cloud Security Privacy Saving Cloud gateways regulatory compliance encryption concerns CIA Amazon Cloud gateways regulatory compliance encryption concerns IoT internet of things Data Breach attack encryption tokenization password malware backoff Breach account Security password encryption tokenization data data flow hipaa healthcare security privacy Target Security Breach PIN Information Encrypted Stolen Experian Cloud gateways regulatory compliance encryption concerns banks PCI compliance security Cloud gateways regulatory compliance encryption concerns Cloud gateways regulatory compliance Payment security PCI DSS Data Breach attack encryption tokenization password monitoring LinkedIN Practical Advice Cloud Data Security Brighttalk Practical Advice Cloud Data Security tokenization CRM Salesforce encryption gateway cloud security compliance tokenization CRM Salesforce encryption gateway cloud Financial data Cloud Security Encryption Tokenization BigData Privacy Hadoop Data Security Analytics CIO Gartner BigData Privacy Hadoop Data Security Analytics CIO Verizon Data Breach Investigations 2014 Target breach Verizon Data Breach Investigations Target Security Manufacturing Verizon Data Breach Investigations cyber insurance policies breach Verizon Data Breach Investigations 2014 Verizon Data Breach Investigations heartbleed Target Darkreading Informationweek Breach Bug Internet Security Safe cloud tokenization Cloud Security Privacy encryption tokenization keys Settlement license software Protegrity patents Safenet Ingrian EPS Element Payment Services Liaison nuBridges settlement Voltage license software Protegrity patents lawsuit Michaels data breach Heartbleed Bug Security health password Google Heartbleed Cyber security Obama healthcare private Cloud Security Privacy encryption Heartbleed Bug Security Canada China Heartbleed Bug Security Bank Cyber Canada Heartbleed Bug Security Bank Cyber Heartbleed Bug Security cloud storage Breach Bug Internet Security Safe Heartbleed Bug IoT Internet of Things Heartbleed Bug Security Security cybercrime Cyber threats insurance industry financial institutions Target Verizon Aberdeen cybersecurity Data breach report APT Privacy database Security Big Data encryption Target SP Data Breach Profit Payment security Target Verizon Aberdeen cybersecurity Data breach PCI compliance Privacy database Health Data Senate Target Data Theft Banks Sue Target Security Auditor Breach Target Trustwave Sued Breach Security Europe BigData Privacy Hadoop Data Security Analytics tokenization RSA Target Verizon Aberdeen cybersecurity Data breach insurance Cyber Insurance Target Verizon Aberdeen cybersecurity Data breach India Target Verizon Aberdeen cybersecurity Data breach Forrester Target Verizon Aberdeen cybersecurity Data breach Big Data Privacy Hadoop Data Security Analytics Target NYOUG Oracle Oracle NYOUG NYC Target Security Breach Stolen Audit PCI Feds Big Data Privacy Data Breach attack Target Breach Cyber Insurance Cyber security Enterprise Data Protection Strategies CIO big data IBM Payment Tokenization breach Target PCI DSS Insurance Security IoT Internet of Things cloud big data Cyber security ISACA Enterprise Data Protection Strategies Target Security Breach PIN Information Encrypted Stolen Big Data BigData Privacy Hadoop Data Security Analytics tokenization TCO Oracle Target Security Europe Cloud Data privacy India regulation cross border offshoring outsourcing Breaches retailers Target Davos data theft Chinese innovation security UN privacy encryption Google China Google China NSA encryption FBI retailer cyber attacks Target Congress Target testify data breach Neiman Marcus data breach bloomberg Neiman Marcus data breach Payment Tokenization breach Target PCI DSS Target Cloud Security Privacy Database Predictions Technology 2014 Encryption Microsoft Enterprise Social Big Data Top IT Trends for 2014 Cyber security ISACA NSA security Aberdeen tokenization IoT pricavy Predictions Securing Protecting Internet of Things Data Security Privilege Protection Healthcare Data Breaches Target Security Breach PIN Information Encrypted Stolen Breach PCI Target Security EMV Big Data cloud privacy eu cross border India Cloud Security Privacy IoT IoT Innovation pricavy Cloud Security Privacy Database HIPAA FTC data security Cloud Security Privacy Database security predictions 2014 Breach Insurance Privacy CSO Risk Compliance Security Big Data cloud privacy eu cross border Ancestry.com Big Data cloud privacy eu cross border Cloud Security Privacy snowden EY Ernst Young customer data privacy compliance business data safe cloud IoT Innovation worm Internet of Things IoT Vulnerable Attack ISACA Innovation Privacy Regulations Microsoft Encryption NSA Spying information security predictions tokenization encryption cloud pci dss Mobile Security Data Privacy Tokenization privacy legislation database security big data tokenization Privacy Security Compliance Regulations privilege data security google ftc Cloud Cross-Border Off-Shoring Outsourcing Privacy Sensitive Data BigData Privacy Hadoop Data Security Analytics tokenization TCO Cloud computing India Privacy Security Regulations BigData Privacy Hadoop Data Security Analytics tokenization cloud compliance BigData Privacy Hadoop Data Security Analytics tokenization profits hacked security encryption adobe tokenization aberdeen Data Security Google encryption privacy Hackers Threat Data Security Tokenization BigData Privacy Hadoop Data Security Analytics tokenization BigData Privacy Hadoop Data Security Analytics Cloud Security Privacy BigData Privacy Hadoop Data Security Analytics Value big data advantage Data Security Privilege Protection Cloud Predictive Analytics privilege data security Cyber risk Power utilities companies Best practices data breach liability Cloud Security BigData Privacy Hadoop Data Security big data specialists skills Survival Insecure Cyberworld Tokenization compromise security privacy EU NSA privacy insider threats breaches Cloud Data NSA CIO security Aberdeen tokenization Encryption tokenization security BigData Privacy Hadoop Data Security Tokenization BigData Analytics Security Privacy Forbes Privileged users risk security Security Data Leaks Lawmakers security health insurance privacy Lawmakers security health insurance privacy BigData Strategy Encryption tokenization In-House Data Thief security NSA encryption standards tokenization NSA encryption BigData Privacy Brighttalk Privacy Security Compliance Regulations Big Data analytics Privacy Security Compliance Regulations Big Data Privacy Big Data Cyber Security Big Data India innovation security privacy BigData Analytics Security Privacy FTC data security IoT Internet of Things Big data Privacy Security hacked security encryption Cloud computing India TOI Privacy Security Regulations timesofindia BigData Analytics Security Privacy hacked security encryption US Big Data security privacy NSA privacy LulzSec hacker Sony data breach Societe Generale India security encryption tokenization India Mumbai PCI DSS Tokenization India Mumbai ISACA COBIT Security Encryption Compliance Hackers digital currency Perfect Money Security data surveillance Obama Apple NSA Outsourcing Cloud financial data PCI DSS PII big data security hadoop Breach Encryption Credit Card Payment Tokenization TCO PCI DSS Wyndham lawsuit FTC databreach security enforcement authority Breaches Prevention regulations Security data cloud PCI compliance Retailers Big Data Security Privacy NSA Boards Risk Compliance Outsourced Security BigData Privacy Hadoop Data Security Data Breach NBCNews Big Data Cloud Privacy security privacy pii breach notification BigData Privacy Microsoft Security Cloud Hospitals Group Practices Payers Policy Regulation Security Data Security Privacy Breaches Tokenization Encryption APT Big Data HR Privacy Breaches Prevention SIEM Verizon Tokenization Masking Encryption APT FDA Cybersecurity Security insiders BigData Privacy NSA Data security privacy data flow enterprise BigData Privacy Oracle analytics Security databases Regulations Cyberattack China Breaches Prevention Outsourced Risk Compliance Hackers CreditCards Passwords Breach Security Banks Mining Analytics BigData Security Cloud CIO WSJ CyberAttack Security Protection HIPAA Security HealthCare Compliance PII PHI Risk Compliance BigData Privacy cloud privacy Data scientist BigData Hackers breached Adobe ColdFusion venture capital security BigData Data Breach Bloomberg security crime privileged account attackers data asecurity phi pii PCI security privacy hipaa challenges solutions My #HIPAA presentation in phi pii PCI security privacy hipaa challenges solutions Big Data Security Data Tokenizing Issued and Pending Patents Ulf Mattsson's Blogs Chain-of-Trust SQL Encryption Oracle Encryption DB2 Encryption Intrusion and Data Leakage Prevention Performance and Scalability Key Management Database Protection Data and Application Security Regulatory Requirements and Industry Initiatives
View all