The Significance of Data Security in the New Normal

Summary In his interview, James Beecham is asked to give his thoughts on what the pandemic has taught us about data security. His thorough response, “With the introduction of regulatory frameworks like the GDPR and CCPA, most companies had already started to increase their awareness of data security and privacy with stricter rules and better […]
Top 50 Tech Startups in Austin to Watch Out For in 2022

Summary Austin has been emerging as America’s one of the top technical hubs. So it’d be appropriate to say that Austin is always open for businesses. According to TechCrunch, “there are a growing number of tech companies – large and small – have relocated their headquarters to Austin or opened offices in the Texas capital.” All […]
Can You Have Both an Offensive vs. Defensive Data Strategy?

Summary The Data Management Body of Knowledge defines data strategy as “a set of choices and decisions that together, chart a high-level course of action to achieve high-level goals.” Data strategy sits at a critical spot within any organization, as it dictates what you do with data to reach the business outcomes you want to achieve. When […]
The Antidote To Deal Registration In Channel Sales Is Stackable Margins

Summary Control comes into play when an inside sales rep involved in deal registration can manipulate that process. If the deal goes to a bid, they may be able to cancel the deal registration altogether if the rules of engagement allow it. In some cases, they can even choose which partner gets the lowest quote, […]
PCI Security Standards Council and the Cloud Security Alliance issue guidance on scoping cloud environments

Summary According to the joint bulletin, data breach investigation reports continue to find that companies hit with payment data compromises are unaware that cardholder data was present on the compromised systems. They say proper scoping can ensure that companies are aware of the location of their data and that the necessary security controls are in […]
Why Traditional Security Is Failing Us

Summary Since the beginning of cybersecurity, most companies have focused the majority of their spending on ensuring that they wall off their core infrastructure with the best technology to stop attackers from getting in. Every time a new threat or attack vector emerged, we added another network technology to protect the business from it. Eventually, […]
Why Traditional Security Is Failing Us, Part 2

Summary Conceptualizing data security in different ways is providing answers that can elucidate both process and practice. The emphasis needs to move from a discursive examination of security and more to the real function of what we are trying to achieve. As the benefits of technology grow, the adoption of cloud, IoT, AI and other […]
Blockchain Can Take Friction Out of PCI Compliance

Summary As data breaches continue to threaten brands, reputations, and bottom lines, PCI compliance is an indicator that enterprise data security leveraging distributed ledger architecture is no longer just a concept, but is now in the hands of business. While the norm has been to encrypt transactions and cardholder data against fraud, this new approach […]
Q2 Holdings Launches Q2 TrustView For Data Security

Summary When Q2 TrustView was created, its goal was to be a leader in technological data governance and protection focused lending. Powered by ALTR, which is a blockchain-based data security provider, Q2’s multi-layered data management and protection approach controls individuals’ access to data with the utmost security. The company added that Q2 TrustView delivers “detailed […]
Blockchain-Based Data Security Taking Over Key Industries

Summary One of the leading innovators in blockchain technology has been ALTR. In June 2018, ALTR made a splash in the healthcare scene with its announcement of multi-million-dollar funding to advance is blockchain cybersecurity initiative. The company’s proprietary Altr-chain technology, a blockchain derivative, is the first “commercial software package” available for enterprise security. “Our platform […]