Skip to content

The DataStealth Blog

Dive into the latest DataStealth updates, be the first to know about new product launches, and get the scoop on all things data security. 

In 2006, British mathematician Clive Humby struck a chord with a powerful phrase: "Data is the new oil." Just as crude oil requires refinement to unleash its power, data in its raw form holds latent...
Read This Blog >
Securing Your Company's Lifeblood in the Age of Cyber Insecurity For the average modern company today, its lifeblood isn’t money. It’s data. Data drives every part of today’s businesses, from...
Read This Blog >
Each party related to processing, storing, or transmitting cardholder data must comply with the Payment Card Industry Data Security Standard (PCI DSS) administered by the Payment Card Industry...
Read This Blog >
On June 16, 2022, the Canadian government introduced Bill C-27, which introduced three Acts meant to modernize federal privacy laws. I reviewed the Consumer Privacy Protection Act and the Personal...
Read This Blog >
Cloud security compliance is a must-have for organizations utilizing cloud services. Configuring and securing new infrastructure can be challenging; ensuring proper adherence to cybersecurity...
Read This Blog >

Beyond The Cloud

While legacy core banking systems once provided the backbone on which the world’s financial infrastructure is built , the processing demands of digitalization and heightened customer expectations...
Read This Blog >
In recent years, digital encryption has been subject to what anthropologists sometimes call “social silence”. It may be a fundamental part of our lives (we depend on it whenever we bank online, send...
Read This Blog >

Data Splitting

Data splitting is when data is divided into two or more subsets. Typically, with a two-part split, one part is used to evaluate or test the data and the other to train the model. Data splitting is an...
Read This Blog >
Data governance is a growing challenge, complicated by a plethora of new laws requiring compliance. And the stress only goes up with increasing data volumes coming from multiple structured and...
Read This Blog >
Image by Gerd Altmann from Pixabay
The data harvested from our personal devices, along with our trail of electronic transactions and data from other sources, now provides the foundation for some of the world’s largest companies....
Read This Blog >
Across the past several years, consumer attitudes and expectations around data privacy and security have shifted, as influenced by a profusion of new data breaches, more online shopping and momentum...
Read This Blog >
To follow up on an earlier communication, PCI SSC is now targeting a Q1 2022 publication date for PCI DSS v4.0. This timeline supports the inclusion of an additional request for comments (RFC) for...
Read This Blog >
Biometrics are increasingly becoming a part of everyday life, from unlocking your phone with your face to iris recognition for e-government services or airport security and voice recognition when you...
Read This Blog >
As the world moves further into the digital era, data security has been an ever-growing concern. Cybercrime continues to climb as digital data becomes more and more prevalent. In light of these...
Read This Blog >
Don't let your guard down just because you are on a mobile device. Be just as careful as you would on a desktop! Mobile attacks are intended to compromise and steal our data. In most cases, users...
Read This Blog >
I’ve recently been thinking about how much more effortless and affordable it has become for users to add a new cloud-based application to their tech stack than traditional on-premises software....
Read This Blog >
In part two of our series, we take a deeper dive into how JavaScript works and its implications to web and e-commerce security and compliance. This demonstration will not surprise anyone with a deep...
Read This Blog >
The 14 Cloud Security Principles released by the National Cyber Security Center (NCSC) provides guidance to organizations in the UK when evaluating cloud providers. This article focuses on the main...
Read This Blog >

Data Privacy In Canada

Between the financial, ethical, and social costs of leaked or insecure consumer data, there is no doubt that keeping online environments secure is a top priority for most organizations. By investing...
Read This Blog >

You Are Worth $1,010 on the Dark Web

Credit card details, online banking logins, and social media credentials are available on the dark web at worryingly low prices. Researchers at privacy website PrivacyAffairs.com collected hundreds...
Read This Blog >
I
Data is the heartbeat of every business application and having a proper testing strategy is essential. Data is, after all, a business's most valuable asset. Data breaches bring Enterprises to the...
Read This Blog >
“I believe people are smart and some people want to share more data than other people do. Ask them. Ask them every time. Make them tell you to stop asking them if they get tired of your asking them....
Read This Blog >
To secure a system, you first have to understand it. Good architecture diagrams are key to this. Unfortunately, the quality of them varies. So, in this blog post I want to give you some tips, and...
Read This Blog >
Image by Gerd Altmann from Pixabay  Data Protection, Data Security Trends, Security Issues
The data-powered world is here. Data empowers our national and global economy: it enables organizations to improve decision making and drives innovation; it empowers companies to provide exciting...
Read This Blog >
In the movement to give consumers more control over their personal data, Canada has been a pioneer. Its first data privacy regulation, the Personal Information Protection and Electronic Documents...
Read This Blog >
Consumers, businesses, and entire systems all over the world are under threat on a daily basis. Valuable personal and financial information is exposed and ready for the taking. Simple tasks like...
Read This Blog >
2020 presented us with many surprises, but the world of data privacy somewhat bucked the trend. Many industry verticals suffered losses, uncertainty and closures, but the protection of individuals...
Read This Blog >
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news,...
Read This Blog >
PCI DSS is the data security standard for the payment card industry and is maintained by the PCI Security Standards Council (PCI SSC). This standard is presented as the minimum criteria merchants...
Read This Blog >