PGP vs. RSA: How Are They Different?
With increases in data breaches, the topics of data encryption and its importance are appearing more often in public discussions of data security. There is also increased confusion about the different types of encryption available – PGP vs RSA. Some are more appropriate for internal purposes, such as with large databases. Others may be more effective […]
AES vs. RSA Encryption: What Are the Differences?
One thing that’s become abundantly clear in the internet age is that preventing unauthorized people from gaining access to the data stored in web-enabled computer systems is extremely difficult. All it takes is for a worker to click on the wrong link in an email, or respond unwarily to a seemingly legitimate request for information, […]
Data Scrambling vs. Encryption
The article below is an update to their Townsend Security’s blog post comparing data scrambling and data encryption. For most organizations, the motivation to encrypt their data is closely tied to various compliance requirements. Such compliance regulations include PCI DSS, HIPAA, HITECH, GDPR, Sarbanes-Oxley (SOX) and a whole host of regional privacy laws. So, if […]
PCI Compliance Standards (PCI DSS): What You Should Know and Why They Matter
The Payment Card Industry Data Security Standards (PCI DSS) requires organizations to encrypt credit card account numbers stored in their databases and ensure that data remains secure when transferred outside the company. In order to understand these PCI compliance requirements, we first should know the source of industry best practices for encryption key management. In […]
NYDFS Cybersecurity Regulations and Encryption – 7 Steps to Compliance
The article below is an update to Townsend Security’s popular blog post on NYDFS cybersecurity regulations. On March 1, 2017, the New York Department of Financial Services (NYDFS) made their cybersecurity regulations for the financial services industry effective and provided covered entities with 180 days to achieve compliance. The financial sector includes banks, insurance companies, […]
Encryption, Tokenization, and Anonymization on IBM i: How Do These Data-Protection Technologies Differ?
The rise of high-profile breaches as well as new/expanded compliance regulations are compelling every company to increase its vigilance when it comes to securing sensitive data. As a result, if you are finding yourself under pressure to understand and implement encryption or some alternative to protect sensitive data within IBM i environments, Precisely has an […]