Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Moody's Analytics Uses Protegrity Pseudonymization to Protect CID Data

The data protection landscape is changing. The rapid adoption of cloud and software as a service (SaaS) greatly affects the financial industry, where many institutions rely on SaaS vendors for data protection previously implemented in-house. Moody’s Analytics relies on cloud service providers (CSPs) to adequately protect its data, showcasing the need for scalability, industry cost controls, and flexibility.

Protegrity and Exasol extend partnership, enabling customers to take advantage of today's rapidly evolving API economy

Integration with Protegrity's Application Protector REST API enhances Exasol's data protection capabilities and enables support for multi-cloud, on-premise and hybrid environments, providing customers with the most advanced and comprehensive data protection capabilities.

Protegrity for Snowflake: Cross-Border Data Movement Made Easy

Organizations must constantly adapt to the challenges of maintaining compliance while handling data. Nowhere is that more apparent than cross-border data protection, which allows data to be and remain protected across jurisdictions, states, counties, and countries with the right data security tools. According to the United Nations, 137 of 197 of its members have data and privacy legislation in place.

Explainer: Data Governance & You

Welcome to the era of data domination! Every day, 2.5 quintillion bytes of data flood the digital landscape, estimates Forbes, with a whopping 90% of data created in just the last two years. While this growth presents many opportunities for organizations, it also introduces many challenges. That’s where data governance comes in. It’s a critical practice for businesses trying to navigate data management and data security.

Frequently Asked Questions on the 2023 EU General Court's Pseudonymised Data Ruling

In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as well as the opportunities this new ruling may offer when transferring and accessing data across borders..

Redefining Personal Data: Understanding the EU General Court's Ruling on Pseudonymized Data

In a ruling made on April 26, 2023, the General Court of the European Union (EU) made a groundbreaking decision changing the definition of personal data that has been in place since the adoption of the General Data Protection Regulation (GDPR). This ruling has significant data-sharing implications for organizations within the EU and enables them to share data with third parties more easily, as long as it’s appropriately de-identified.

Featured Post

GDPR - the benchmark for a global privacy framework

With the 5th anniversary of GDPR looming, this regulation continues to be a game-changer, setting the precedent for privacy and data laws around the world. In fact, the United Nations Conference on Trade and Development (UNCTAD) recently reported that 71% of countries now have data protection regulations in place and a further 9% have legislation in development. Countries such as Vietnam and Saudi Arabia have recently introduced new privacy laws. But, as we reflect on the anniversary of GDPR's introduction, just this week we've seen the first billion-dollar fine issued. So, what does this mean for data privacy moving forward?

Coast Capital Savings Credit Union: Meeting Canadian Regulatory Standards for Compliance with Protegrity

One of Canada’s largest credit unions, Coast Capital Savings Credit Union (CSS), with over 50 branches across the country, needed to protect critical PII data stored in their AWS cloud environments, Amazon Redshift, AWS EMR, and AWS S3. CSS had to meet Canadian regulatory standards for compliance in 2021, including the Personal Information Electronic Documents Act (PIPEDA), along with a data transformation initiative surrounding its architecture.

Privacy is Power: The Value of Training for Modern Data Protection

We’ve all seen it in the movies: The chief of security declares that no one could ever steal the “Famous Jewel” because it’s protected by thick glass, an impenetrable system of motion-detecting lasers, and, finally, a weight-sensitive sensor. Cut to the next scene, where a thief, dressed in sleek black, zip-lines from an open skylight, shorts the lasers, scores the glass, and with split-second timing, swaps the jewel for a replica of equal weight.