E-mail:
Password:
Register | Help

Latest Publications

The backlash against big data   (2014-04-24)
Businesses look for tech solutions to big data security issues   (2014-04-24)
Even the most secure cloud storage may not be so secure, study finds   (2014-04-23)
Settlements licensed Protegrity patents to Safenet Ingrian , EPS Payment Services and Liaison nuBridges   (2014-04-23)
Amicable financial settlement grants Voltage license to core Protegrity patents - 5 patents in lawsuit   (2014-04-23)
Heartbleed Will Require Rehab   (2014-04-21)
Michaels Stores confirms data breach, 3 million cards affected   (2014-04-20)
Health-care site vulnerable to Heartbleed; users told to reset passwords   (2014-04-20)
Google accused of taking too long to report Heartbleed bug   (2014-04-20)
Cyber security flaw on Obama's healthcare site could affect private information   (2014-04-19)
Avoiding The Next Heartbleed   (2014-04-19)
Cloud tokenization: Why it might replace cloud encryption   (2014-04-18)
Canada Arrests Teener Who Stole Social Insurance Numbers Using Heartbleed   (2014-04-18)
Protecting Your Company's Reputation in a Heartbleed World   (2014-04-14)
SECURITY FIRM SAYS CANADIAN BANKS NEED TO BOLSTER PROTECTION FROM HEARTBLEED BUG   (2014-04-13)
Heartbleed bug highlights banksí severe cyber security headaches   (2014-04-12)
Just How Serious IS Heartbleed? You Probably Donít Want To Know   (2014-04-12)
#Heartbleed and Free #Cloud #Storage For Entrepreneurs: Top 6 Picks   (2014-04-12)
Heartbleed: Examining The Impact   (2014-04-11)
Controlling the (Heart)Bleeding   (2014-04-11)

View more

Categories

Cloud Security Privacy encryption tokenization keys Settlement license software Protegrity patents Safenet Ingrian EPS Element Payment Services Liaison nuBridges settlement Voltage license software Protegrity patents lawsuit Michaels data breach Heartbleed Bug Security health password Google Heartbleed Cyber security Obama healthcare private Cloud Security Privacy encryption Heartbleed Bug Security Canada China Heartbleed Bug Security Bank Cyber Canada Heartbleed Bug Security Bank Cyber Heartbleed Bug Security cloud storage Breach Bug Internet Security Safe Heartbleed Bug IoT Internet of Things Heartbleed Bug Security Security cybercrime Cyber threats insurance industry financial institutions Target Verizon Aberdeen cybersecurity Data breach report APT Privacy database Security Big Data encryption Target SP Data Breach Profit Payment security Target Verizon Aberdeen cybersecurity Data breach PCI compliance Privacy database Health Data Senate Target Data Theft Banks Sue Target Security Auditor Breach Target Trustwave Sued Breach Security Europe BigData Privacy Hadoop Data Security Analytics tokenization RSA Target Verizon Aberdeen cybersecurity Data breach insurance Cyber Insurance Target Verizon Aberdeen cybersecurity Data breach India Target Verizon Aberdeen cybersecurity Data breach Forrester Target Verizon Aberdeen cybersecurity Data breach Big Data Privacy Hadoop Data Security Analytics Target NYOUG Oracle Oracle NYOUG NYC Target Security Breach Stolen Audit PCI Feds Big Data Privacy Data Breach attack Target Breach Cyber Insurance Cyber security Enterprise Data Protection Strategies CIO big data IBM Payment Tokenization breach Target PCI DSS Insurance Security IoT Internet of Things cloud big data Cyber security ISACA Enterprise Data Protection Strategies Target Security Breach PIN Information Encrypted Stolen Big Data BigData Privacy Hadoop Data Security Analytics tokenization TCO Oracle Target Security Europe Cloud Data privacy India regulation cross border offshoring outsourcing Breaches retailers Target Davos data theft Chinese innovation security UN privacy encryption Google China Google China NSA encryption FBI retailer cyber attacks Target Congress Target testify data breach Neiman Marcus data breach bloomberg Neiman Marcus data breach Payment Tokenization breach Target PCI DSS Target Cloud Security Privacy Database Predictions Technology 2014 Encryption Microsoft Enterprise Social Big Data Top IT Trends for 2014 Cyber security ISACA NSA security Aberdeen tokenization IoT pricavy Predictions Securing Protecting Internet of Things Data Security Privilege Protection Healthcare Data Breaches Target Security Breach PIN Information Encrypted Stolen Breach PCI Target Security EMV Big Data cloud privacy eu cross border India Cloud Security Privacy IoT IoT Innovation pricavy Cloud Security Privacy Database HIPAA FTC data security Cloud Security Privacy Database security predictions 2014 Breach Insurance Privacy CSO Risk Compliance Security Big Data cloud privacy eu cross border Ancestry.com Big Data cloud privacy eu cross border Cloud Security Privacy snowden EY Ernst Young customer data privacy compliance business data safe cloud IoT Innovation worm Internet of Things IoT Vulnerable Attack ISACA Innovation Privacy Regulations Microsoft Encryption NSA Spying information security predictions tokenization encryption cloud pci dss Mobile Security Data Privacy Tokenization privacy legislation database security big data tokenization Privacy Security Compliance Regulations privilege data security google ftc Cloud Cross-Border Off-Shoring Outsourcing Privacy Sensitive Data BigData Privacy Hadoop Data Security Analytics tokenization TCO Cloud computing India Privacy Security Regulations BigData Privacy Hadoop Data Security Analytics tokenization cloud compliance BigData Privacy Hadoop Data Security Analytics tokenization profits hacked security encryption adobe tokenization aberdeen Data Security Google encryption privacy Hackers Threat Data Security Tokenization BigData Privacy Hadoop Data Security Analytics tokenization BigData Privacy Hadoop Data Security Analytics Cloud Security Privacy BigData Privacy Hadoop Data Security Analytics Value big data advantage Data Security Privilege Protection Cloud Predictive Analytics privilege data security Cyber risk Power utilities companies Best practices data breach liability Cloud Security BigData Privacy Hadoop Data Security big data specialists skills Survival Insecure Cyberworld Tokenization compromise security privacy EU NSA privacy insider threats breaches Cloud Data NSA CIO security Aberdeen tokenization Encryption tokenization security BigData Privacy Hadoop Data Security Tokenization BigData Analytics Security Privacy Forbes Privileged users risk security Security Data Leaks Lawmakers security health insurance privacy Lawmakers security health insurance privacy BigData Strategy Encryption tokenization In-House Data Thief security NSA encryption standards tokenization NSA encryption BigData Privacy Brighttalk Privacy Security Compliance Regulations Big Data analytics Privacy Security Compliance Regulations Big Data Privacy Big Data Cyber Security Big Data India innovation security privacy BigData Analytics Security Privacy FTC data security IoT Internet of Things Big data Privacy Security hacked security encryption Cloud computing India TOI Privacy Security Regulations timesofindia BigData Analytics Security Privacy hacked security encryption US Big Data security privacy NSA privacy LulzSec hacker Sony data breach Societe Generale India security encryption tokenization India Mumbai PCI DSS Tokenization India Mumbai ISACA COBIT Security Encryption Compliance Hackers digital currency Perfect Money Security data surveillance Obama Apple NSA Outsourcing Cloud financial data PCI DSS PII big data security hadoop Breach Encryption Credit Card Payment Tokenization TCO PCI DSS Wyndham lawsuit FTC databreach security enforcement authority Breaches Prevention regulations Security data cloud PCI compliance Retailers Big Data Security Privacy NSA Boards Risk Compliance Outsourced Security BigData Privacy Hadoop Data Security Data Breach NBCNews Big Data Cloud Privacy security privacy pii breach notification BigData Privacy Microsoft Security Cloud Hospitals Group Practices Payers Policy Regulation Security Data Security Privacy Breaches Tokenization Encryption APT Big Data HR Privacy Breaches Prevention SIEM Verizon Tokenization Masking Encryption APT FDA Cybersecurity Security insiders BigData Privacy NSA Data security privacy data flow enterprise BigData Privacy Oracle analytics Security databases Regulations Cyberattack China Breaches Prevention Outsourced Risk Compliance Hackers CreditCards Passwords Breach Security Banks Mining Analytics BigData Security Cloud CIO WSJ CyberAttack Security Protection HIPAA Security HealthCare Compliance PII PHI Risk Compliance BigData Privacy cloud privacy Data scientist BigData Hackers breached Adobe ColdFusion venture capital security BigData Data Breach Bloomberg security crime privileged account attackers data asecurity phi pii PCI security privacy hipaa challenges solutions My #HIPAA presentation in phi pii PCI security privacy hipaa challenges solutions Big Data Security Data Tokenizing Issued and Pending Patents Ulf Mattsson's Blogs Chain-of-Trust SQL Encryption Oracle Encryption DB2 Encryption Intrusion and Data Leakage Prevention Performance and Scalability Key Management Database Protection Data and Application Security Regulatory Requirements and Industry Initiatives
View all