Securing PII

Best Practices in Data Tokenization

Essential Data Tokenization Best Practices: A Complete Guide Tokenization is the process of replacing sensitive data with unique identifiers (tokens) that do not inherently have any meaning. Doing this helps secure the original underlying data against unauthorized access or usage. Tokenization was invented in 2001 to secure payment card data and quickly became the dominant […]

Best Practices in Data Tokenization Read More »

Portal26’s Guide To Preventing Data Exfiltration

Preventing Data Exfiltration Effectively: A Comprehensive Guide In today’s data driven world, data can be considered one of the most valuable assets an enterprise’s possession. A vast majority of security controls deployed in an organization serve to keep its data secure and private and so one could argue that an organization’s security posture can be

Portal26’s Guide To Preventing Data Exfiltration Read More »

What is FIPS 140 and what does it mean to be “FIPS compliant”?

What is FIPS 140 and what does it mean to be “FIPS compliant”? FIPS was developed by the Computer Security Division of the National Institute of Standards and Technology (NIST). It established a data security and computer system standard that businesses must follow in accordance with the Federal Information Security Management Act of 2002. (FISMA).

What is FIPS 140 and what does it mean to be “FIPS compliant”? Read More »

How to protect against the Daixin Team Ransomware Group

How to protect against the Daixin Team Ransomware Group Ransomware attacks are common and becoming more creative. However, as attackers evolve, so do their decisions of targets and methodology.  As of October 2022, the FBI’s Internet Crime Complaint Center (IC3) holds victim reports across all 16 critical infrastructures, but the healthcare and public health sector

How to protect against the Daixin Team Ransomware Group Read More »

FedRAMP Certification: An Overview of Why It Matters

FedRAMP Certification: Why It Matters – A Comprehensive Overview Cloud Service Providers seeking certification may see a more efficient authorization process utilizing Portal26’s encryption and vault technologies. Cybersecurity is now in the spotlight as data breaches become a near-daily story. Organizations are consuming massive amounts of personal data that is directly tied to everyday people,

FedRAMP Certification: An Overview of Why It Matters Read More »

Securing elasticsearch

Keeping Elasticsearch data secure from attacks and exposure

Keeping Elasticsearch data secure from attacks and exposure In the last few years enterprises have seen an unprecedented amount of data lost from vulnerable Elasticsearch clusters. Tens of billions of records of highly sensitive data across financial services, healthcare, high-tech, retail, and hospitality segments have been exposed or stolen. A simple web search for Elasticsearch

Keeping Elasticsearch data secure from attacks and exposure Read More »

BlackCat Ransomware attacks - prevention - Portal26

Protect your organization from BlackCat Ransomware attacks

Ransomware Prevention: Protect your organization from BlackCat Ransomware attacks Where there is value for organizations online, there will be a cybercriminal ready with a ransomware attack to exploit it.  Since they first emerged in December of 2021, BlackCat Ransomware has become another example of a ring of cybercriminals who practice the model of Ransomware-as-a-Service (RaaS)

Protect your organization from BlackCat Ransomware attacks Read More »