Encryption

Best Practices in Data Tokenization

Essential Data Tokenization Best Practices: A Complete Guide Tokenization is the process of replacing sensitive data with unique identifiers (tokens) that do not inherently have any meaning. Doing this helps secure the original underlying data against unauthorized access or usage. Tokenization was invented in 2001 to secure payment card data and quickly became the dominant […]

Best Practices in Data Tokenization Read More »

Quantum Computers and Encryption (480 × 270 px)

Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption

Can Quantum Computers Break Encryption?  Demystifying the Connection Between Quantum Computing and Encryption With recent news about advances in quantum computing and the potential risk to information security, a lot of people are wondering about the connection between quantum computing and encryption. This article seeks to answer these questions in simple terms and as a

Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption Read More »

Portal26’s Guide To Preventing Data Exfiltration

Preventing Data Exfiltration Effectively: A Comprehensive Guide In today’s data driven world, data can be considered one of the most valuable assets an enterprise’s possession. A vast majority of security controls deployed in an organization serve to keep its data secure and private and so one could argue that an organization’s security posture can be

Portal26’s Guide To Preventing Data Exfiltration Read More »

What is FIPS 140 and what does it mean to be “FIPS compliant”?

What is FIPS 140 and what does it mean to be “FIPS compliant”? FIPS was developed by the Computer Security Division of the National Institute of Standards and Technology (NIST). It established a data security and computer system standard that businesses must follow in accordance with the Federal Information Security Management Act of 2002. (FISMA).

What is FIPS 140 and what does it mean to be “FIPS compliant”? Read More »

How to protect against the Daixin Team Ransomware Group

How to protect against the Daixin Team Ransomware Group Ransomware attacks are common and becoming more creative. However, as attackers evolve, so do their decisions of targets and methodology.  As of October 2022, the FBI’s Internet Crime Complaint Center (IC3) holds victim reports across all 16 critical infrastructures, but the healthcare and public health sector

How to protect against the Daixin Team Ransomware Group Read More »

FedRAMP Certification: An Overview of Why It Matters

FedRAMP Certification: Why It Matters – A Comprehensive Overview Cloud Service Providers seeking certification may see a more efficient authorization process utilizing Portal26’s encryption and vault technologies. Cybersecurity is now in the spotlight as data breaches become a near-daily story. Organizations are consuming massive amounts of personal data that is directly tied to everyday people,

FedRAMP Certification: An Overview of Why It Matters Read More »

Securing elasticsearch

Keeping Elasticsearch data secure from attacks and exposure

Keeping Elasticsearch data secure from attacks and exposure In the last few years enterprises have seen an unprecedented amount of data lost from vulnerable Elasticsearch clusters. Tens of billions of records of highly sensitive data across financial services, healthcare, high-tech, retail, and hospitality segments have been exposed or stolen. A simple web search for Elasticsearch

Keeping Elasticsearch data secure from attacks and exposure Read More »