Portal26 selected as a finalist for 2024 AI Trailblazer award

Transform Your Secure Web Gateway into a Powerful GenAI Governance and Security Platform

Data Privacy

Best Practices in Data Tokenization

Essential Data Tokenization Best Practices: A Complete Guide Tokenization is the process of replacing sensitive data with unique identifiers (tokens) that do not inherently have any meaning. Doing this helps secure the original underlying data against unauthorized access or usage. Tokenization was invented in 2001 to secure payment card data and quickly became the dominant […]

Best Practices in Data Tokenization Read More »

The Counter Ransomware Summit: Tackling Global Cybersecurity

The Counter Ransomware Summit: Tackling Global Cybersecurity

The Counter Ransomware Summit: Tackling Global Cybersecurity Amidst heightened uncertainty in the world of cybersecurity, the White House is currently hosting the 2nd International Counter Ransomware Summit as a two-day event. This summit brings together three dozen nations within the European Union and includes some of the nation’s top security officials. Another key group attending

The Counter Ransomware Summit: Tackling Global Cybersecurity Read More »

Securing elasticsearch

Keeping Elasticsearch data secure from attacks and exposure

Keeping Elasticsearch data secure from attacks and exposure In the last few years enterprises have seen an unprecedented amount of data lost from vulnerable Elasticsearch clusters. Tens of billions of records of highly sensitive data across financial services, healthcare, high-tech, retail, and hospitality segments have been exposed or stolen. A simple web search for Elasticsearch

Keeping Elasticsearch data secure from attacks and exposure Read More »

A New Approach to Privacy-Preserving Encryption

GUEST BLOG For years, I’d always assumed that privacy-preserving encryption was equivalent to homomorphic encryption. You will recall that with homomorphic encryption, arithmetic can be done on encrypted data to produce the same value as would emerge for addition of the cleartext. This method has received so much investment that it’s not hard to conclude that it’s required

A New Approach to Privacy-Preserving Encryption Read More »

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch We recently learnt that a number of our prospects were running their B2B SaaS platform on top of Elasticsearch. Nearly all of them asked if we also support AWS OpenSearch. Many of them are running older versions of Elasticsearch and are evaluating if they should

OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch Read More »