Systems | Development | Analytics | API | Testing

Security

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.

PII Pseudonymization: Explained in Plain English

Data processors handle an abundance of data — including personal information about individuals. As the collection and use of data become more widespread, governments continue to enact laws that protect personally identifiable information (PII). Failing to comply with such laws means risking serious fines and penalties, and damaging public trust. Masking PII through pseudonymization is one way to protect it.

Privacy & Security Rules for Healthcare Marketers

Marketing is more complex if you're engaged in the healthcare field. Whether you work with patients or market to consumers interested in healthcare products, it's important to understand HIPAA guidelines. This article explains the basics of HIPAA Privacy and Security Rules, and how this legislation affects your marketing strategy.

Interview With Transmosis CEO Chase Norlin

For the seventh instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed the CEO of Transmosis, Chase Norlin to share his journey in the field of cybersecurity as well as his recommendations for those looking to start their career in cybersecurity.

PII Pseudonymization is the New Normal

Businesses rely on personal data to better tailor their approach to customer relations and streamline a marketing strategy suited to their target audience. In today's business climate, holding onto the personally identifiable information (PII) of specific individuals for various marketing and customer services purposes requires secure storage and extraction. PII pseudonymization is the latest and greatest method for protecting personal data.

Secure PII Pseudonymization: How to Do It Right

With news of a devastating data breach constantly in the headlines, you need to take proactive steps to safeguard the personally identifiable information (PII) that your organization stores and processes. Along with techniques such as PII masking, PII pseudonymization is one of the most popular and practical ways to protect sensitive data. But what is PII pseudonymization, exactly, and how can you pseudonymize PII? We’ll answer these questions and more in this article.

5 Steps to Prevent PII Data Breaches

When it was revealed in September 2017, the massive Equifax data breach made international headlines. As one of the three major credit agencies in the United States, Equifax is responsible for processing personally identifiable information (PII) such as individuals’ names, addresses, and social security numbers. According to Equifax, 143 million people were affected by the data breach, making it one of the biggest cybersecurity disasters in history.

Fraud Processing with SQL Stream Builder

SQL Stream Builder allows developers and analysts to write streaming applications using industry-standard SQL. In this video, you will learn the interactive experience with syntax checking, error reporting, schema detection, query creation, and creating outputs on fraud detection with its powerful interface and APIs.