With the launch of ApplePay for secure online and mobile payments, tokenization has become a hot topic in data security right now. Born from a need to secure PCI data, tokenization technologies substitute real data with fake data or a 'token' that has no value to a thief.
Tokenization can be used to de-identify any structured sensitive information, as defined by PCI DSS, HIPAA and NIST and others, such as credit cards, names, social security numbers, addresses, and any other PCI, personally identifiable information (PII), or protected health information (PHI) data. Tokens have the same appearance as the data they replace, meaning they can be used for processing and analytics in existing systems with minimal modification. Recent statistics from CSIS put the cost of breaches last year at around $400 billion with over 100 million people affected globally.
As data creation continues exponentially, the cost, risk and sophistication of breaches increase, and laws governing data security are debated and reformed globally, all industries are fast turning to tokenization to secure their data. But not all tokenization is created equal. Modern vaultless tokenization delivers the most secure, transparent and flexible solution with the greatest ROI to organizations looking to protect and realize the value in their sensitive and customer data. In this slideshow, Protegrity explains five characteristics of tokenization that every organization can benefit from.
Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ... More >>
Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ... More >>
Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ... More >>