Tag : comforte

https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg
Articles C2 Winter 2021 Data Data Security

Getting Started with Data-centric Security

Dan Simmons
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
Articles C2 Spring 2021 Data Security

‘New Nacha supplementing data security requirements coming up’

Thomas Gloerfeld
Nacha is a non-profit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through the development of rules, standards, governance, education,...
C2 Fall 2020

End-to-End Cloud Data Security: Shouldn’t It Be a No-Brainer?

comforte
Hardly a week goes by without news of a high-profile data breach. Sometimes, the damage is quite limited either due to the low market value of the apprehended data, the strength of the data security...
C2 Summer 2020

Robust security strategy for your hybrid IT

Thomas Gloerfeld
What Is Hybrid IT? At its most basic level, hybrid IT is a blend of cloud-based and on-premises IT services. When applications and data were all maintained on-premises (or in-house) standardization was a best practise...