cloud security platform

Why Cloud Data Protection Needs an Additional Layer of Security

64% of respondents in a recent study cited data loss or leakage as their biggest cloud security concern. Data privacy and confidentiality issues took second place, followed by the accidental exposure of credentials. It’s a grim reminder that while accelerating the pace of cloud migration is a top priority for many businesses, the efficacy of …

Why Cloud Data Protection Needs an Additional Layer of Security Read More »

Solving the Right to be Forgotten Problem

The Right to be Forgotten (technically the right to erasure or for users to have personal data removed from service providers’ records) creates a big problem for suppliers. This right is becoming standard across the new global wave of data protection and consumer privacy legislation that has followed GDPR.

Right to Be Forgotten: GDPR vs. CCPA Compliance

Today, organizations are scrambling to meet and maintain a new data security compliance requirement, the ‘Right to Be Forgotten,’ also known as the ‘right to erasure.’ Right to Be forgotten is a part of both the GDPR & CCPA compliance frameworks that require an organization to erase a data owner’s personally identifiable information upon that …

Right to Be Forgotten: GDPR vs. CCPA Compliance Read More »

Rixon Technology Partners with Cloud Comrade to Bring Security Services to APAC

Earlier this month Rixon Technology partners with Singapore-headquartered cloud consulting provider Cloud Comrade. For Cloud Comrade, which already counts cybersecurity vendor Trend Micro among its vendor partners, the partnership sees the cloud consulting provider on-board a relatively unique offering in the security space. Rixon Technology’s security offering provides an enterprise-grade data security-as-a-service solution designed to …

Rixon Technology Partners with Cloud Comrade to Bring Security Services to APAC Read More »

Tokenization vs. Encryption for Data Protection Compliance

Tokenization is a branch of cryptography, but should not be confused with encryption. Encryption is used to hide strings of text based on mathematics. Tokenization replaces individual characters with a different character based on randomness. If you can reverse the encryption mathematics, you get access to the entire string of encrypted text. If you can reverse the token randomness, you get access to a single character.