comforte

Data Security in 2025: Five Steps to Strategic Success in 2025

Data Security in 2025: Five Steps to Strategic Success in 2025

As 2025 begins, IT security and business leaders will be braced for another challenging year ahead. In the long-term, economic uncertainty and geopolitical instability seem set to continue, creating the conditions in which threat actors thrive. They will increasingly have the tools at their disposal to launch more impactful cyber-attacks in greater numbers. In the meantime, boards will want to push ahead with important digital transformation initiatives—potentially expanding their attack surfaces in the process.

Read more
comforte-c2Picture3

Multi-Factor Authentication on HPE NonStop from comforte

comforte made a significant announcement at the NonStop Technical Boot Camp (TBC) in Monterey recently, unveiling its innovative multi-factor authentication (MFA) solution tailored for HPE NonStop systems. The launch highlighted comforte’s commitment to enhancing security for industries reliant on NonStop platforms, such as banking and finance, by introducing a solution that bolsters authentication measures without compromising performance.

The solution integrates seamlessly into existing infrastructures, offering features like TOTP support and transparent integration with Pathway applications.…

Read more
Why Tokenisation Beats Transparent Data Encryption for PCI DSS Compliance } comforte

Why Tokenisation Beats Transparent Data Encryption for PCI DSS Compliance

Cyber threats are rapidly evolving and breaches are on the rise. That makes compliance with the Payment Card Industry Data Security Standard (PCI DSS) ever more critical for organizations handling sensitive payment card data. A key aspect of this framework is safeguarding data at rest – but the requirements are changing. Disk- or partition-level encryption is no longer permissible to protect non-removable electronic media.

Read more

Cybersecurity in the Boardroom: A Strategic Driver for Growth

Cybersecurity has struggled for many years to make it onto the boardroom agenda. The perception of it as a purely technology function with limited strategic importance has led many organizations to take a short-term, check-box approach to managing cyber risk. This grossly undervalues the role cyber can and should have. In fact, one 2023 study finds that half (51%) of global business decision makers (BDMs) still consider “it a necessary cost but not a revenue contributor,” while 38% see it as a barrier rather than a business enabler.…

Read more
https://insights.comforte.com/hubfs/Businessman%20touching%20futuristic%20lock%20and%20circuit%20board%20interface%20in%20data%20center.jpeg

Why it’s Time to Get Proactive About Security

Of all the business risks facing organizations today, cyber-attacks were recently highlighted by executives as the most serious. That’s a heartening sign that awareness levels at the very top are at least improving. But it’s too soon to get carried away. In fact, separate research reveals that many organizations still treat security as an afterthought, until they’re breached.

It’s 2022 and organizations can do better.…

Read more
https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg

Getting Started with Data-centric Security

With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations.
Read more
blog header gdpr anniversary

Three Years of GDPR – a Look Back

It might be hard to imagine, but it has been three years since the General Data Protection Regulation (GDPR) was implemented in the European Union (EU) on 25 May 2018. Time certainly does fly by when you are trying to protect data. Nevertheless, the term ‘GDPR’ has set a precedent on what is to be expected from organizations when it comes to protecting personally identifiable information (PII) of EU data subjects and has served as the foundational inspiration for many international data security regulations.
Read more

‘New Nacha supplementing data security requirements coming up’

Nacha is a non-profit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through the development of rules, standards, governance, education, advocacy, and in support of innovation, Nacha's efforts benefit the providers and users of those systems. Nacha leads groups focused on API standardization, authors the Quest Operating Rules for EBT, and is the steward of the ACH Network, a payment system that universally connects all U.S. bank accounts and facilitates the movement of money and information. In 2020, nearly 27 billion payments and close to $62 trillion in value moved across the ACH Network.
Read more

Robust security strategy for your hybrid IT

What Is Hybrid IT? At its most basic level, hybrid IT is a blend of cloud-based and on-premises IT services. When applications and data were all maintained on-premises (or in-house) standardization was a best practise and security was much simpler. Now that the business and IT are realising the benefits of cloud services, hybrid IT is the common strategy. The new benefits of agility and flexibility brought by hybrid IT come at a cost… How do we keep these more vulnerable applications and data secure?
Read more