Meet Portal26 at RSA in San Francisco, May 6 – 8

State of Generative AI | Interactive Survey Results

Encryption

FedRAMP Certification: An Overview of Why It Matters

FedRAMP Certification: An Overview of Why It Matters Cloud Service Providers seeking certification may see a more efficient authorization process utilizing Portal26’s encryption and vault technologies. Cybersecurity is now in the spotlight as data breaches become a near-daily story. Organizations are consuming massive amounts of personal data that is directly tied to everyday people, and […]

FedRAMP Certification: An Overview of Why It Matters Read More »

The Counter Ransomware Summit: Tackling Global Cybersecurity

The Counter Ransomware Summit: Tackling Global Cybersecurity

The Counter Ransomware Summit: Tackling Global Cybersecurity Amidst heightened uncertainty in the world of cybersecurity, the White House is currently hosting the 2nd International Counter Ransomware Summit as a two-day event. This summit brings together three dozen nations within the European Union and includes some of the nation’s top security officials. Another key group attending

The Counter Ransomware Summit: Tackling Global Cybersecurity Read More »

Securing elasticsearch

Keeping Elasticsearch data secure from attacks and exposure

Keeping Elasticsearch data secure from attacks and exposure In the last few years enterprises have seen an unprecedented amount of data lost from vulnerable Elasticsearch clusters. Tens of billions of records of highly sensitive data across financial services, healthcare, high-tech, retail, and hospitality segments have been exposed or stolen. A simple web search for Elasticsearch

Keeping Elasticsearch data secure from attacks and exposure Read More »

Data States Security Experts Unhappy With Traditional Tokenization

Data States Security Experts Unhappy With Traditional Tokenization

Data States Security Experts Unhappy With Traditional Tokenization Cybersecurity experts may look to Portal26 for all the benefits of traditional tokenization and none of the tradeoffs.   Portal26’s 2022 State of Enterprise Tokenization Survey shows that the vast majority of cybersecurity experts are dissatisfied with their current tokenization tools. In fact, despite spending 1 million dollars

Data States Security Experts Unhappy With Traditional Tokenization Read More »

Data Exfiltration

Data Exfiltration And How To Protect Your Data

Traditional Data Security Tools Fail at 60% Rate, Become Immune to Data Exfiltration with Portal26 Portal26’s ‘State of Data Exfiltration & Extortion Report’ shows that organizations may be less protected from security threats than they believe. Ransomware is becoming more and more about extortion, and current dataloss prevention tactics aren’t measuring up to the challenge.

Data Exfiltration And How To Protect Your Data Read More »

A New Approach to Privacy-Preserving Encryption

GUEST BLOG For years, I’d always assumed that privacy-preserving encryption was equivalent to homomorphic encryption. You will recall that with homomorphic encryption, arithmetic can be done on encrypted data to produce the same value as would emerge for addition of the cleartext. This method has received so much investment that it’s not hard to conclude that it’s required

A New Approach to Privacy-Preserving Encryption Read More »

Assumed Breach posture: how does encryption of data-in-use help?

Assumed Breach posture: how does encryption of data-in-use help? When unauthorized individuals extract restricted and sensitive information from protected systems, the event is known as a data breach. Such incidents incur major financial consequences on the victims. This necessitates a set of standard security measures to be taken. . How can we predict such possibilities

Assumed Breach posture: how does encryption of data-in-use help? Read More »

OpenSearch Partner Highlight: How Portal26 Plugin can further secure…

OpenSearch Security: How Portal26 Plugin can further secure your OpenSearch Deployment Over the past few years there have been numerous security breaches reported in the news. These types of incidents are top of mind as people want to ensure the software and services they build are secure. OpenSearch provides an out-of-the-box security plugin so that developers can

OpenSearch Partner Highlight: How Portal26 Plugin can further secure… Read More »

Normalizing Outliers in Cybersecurity – Ransomware Edition

Ransomware Defense: Normalizing Outliers in Cybersecurity – Ransomware Edition Last week, I wrote an article titled “Black Swan in Data Security”. The primary point I made is that most IT projects fail to consider even mild outlier events when it comes to security (such as compromised passwords or breach). However what used to be an

Normalizing Outliers in Cybersecurity – Ransomware Edition Read More »