Prime Factors Blog

January 9, 2024
Simplifying OpenPGP – Streamlining Sharing Encrypted Files Securely with Third Parties

Every day, businesses share sensitive information outside the enterprise, such as sending purchasing files or other documents containing personally identifiable information to trading partners, resellers, or third parties. Safeguarding this data is crucial to avoid a breach and comply with regulations, which is why organizations often implement file encryption infrastructure to keep sensitive information secure […]

Read More
November 30, 2023
Prime Factors & Thales' 30 Year Collaboration Continues to Deliver Simplicity, Flexibility, and Security for Payment Applications

Thales recently announced the launch of the payShield Cloud HSM service, making it easier and more flexible for payment HSMs to migrate to the cloud. Our team at Prime Factors had the opportunity to be among the first to successfully test the new HSM service with our Bank Card Security System (BCSS) to ensure flexibility and full functionality […]

Read More
August 28, 2023
5 Data Protection and Privacy Methods to Modernize Your Data Security Strategy

Encryption is the process of encoding information so that it is unreadable to unauthorized parties. What makes encryption so powerful is that if data is intercepted, it remains unintelligible without the corresponding cryptographic keys used to encrypt the data. While encryption remains essential to most enterprises’ data protection strategy, the proliferation of data protection regulations, […]

Read More
January 23, 2023
Legacy Data Encryption Solutions Were Never Designed to Protect Data in Use.
Why Protecting Data at the Application Level is so important. 

Data has never been more plentiful or more valuable, nor has it ever been more at risk from breach. Though hundreds of billions of dollars are spent each year on cyber security, data breaches continue all over the world, and sensitive data is still frequently compromised.   Why is this still happening?  Surely, enterprises now know […]

Read More
July 14, 2022
Implementing Tokenization Shouldn’t Be So Damn Hard

What surprised us in a recent inquiry with a leading global analyst firm was not the fact that they had seen an increase in tokenization inquiries of more than 700% year-over-year; we had been seeing the same spikes on our end.   It was, rather, what was happening after the initial inquiries that caught our attention.  […]

Read More
June 8, 2021
New survey reveals many companies do not encrypt data in use, but plans are in the works to address this security gap.

The majority of data breaches today are occurring at the application layer where sensitive information is more exposed and susceptible, however a joint research survey with Entrust revealed that less than 25 percent of respondents are actually applying data protection at the application layer, instead relying on data-at-rest encryption.  The challenge is that data-at-rest encryption […]

Read More
April 1, 2021
Happy 2^3x5!!! Prime Factors turns 40!

The year was 1981.  It was a Wednesday, the first day of April.  President Reagan was in the hospital recovering from gunshot wounds. Walter Cronkite was enjoying the first few weeks of his retirement after signing off from CBS Evening News.  And just off of the University of California’s Berkeley campus on the eastern shores […]

Read More
October 13, 2020
Psst… Don’t Look Now, but Your Sensitive Data is Showing.

I always find it interesting when our perceptions of how things work do not match up with reality.  We were in a meeting not long ago with a large customer, discussing their encryption deployment, and a simple exchange highlighted a common misunderstanding of data protection:   Us: “You may want to consider application level data protection so that your data is not in the clear when it leaves the database.” Customer (CEO): “What do you mean our encrypted data is […]

Read More
February 19, 2020
Subpoena-Proofing Data in the Cloud

“…to subpoena-proof the cloud!” We had asked one of our largest customers what they were looking to accomplish with the deployment of our application-level data protection software.  This was their response. This certainly did not seem like the typical statement of requirements for a data protection solution! I’ve been in data and network security for nearly […]

Read More
April 27, 2017
Encryption: The Cost, The Protection, and the ROI

It's no longer only the concern of governments and corporations: encryption is both lock and key to cybersecurity across a range of organizations, of all sizes.  In 2016, the Ponemon Institute calculated the average total cost of a data breach to be $4 million. The next two years sees the chances of 10,000 lost or […]

Read More
March 21, 2017
Dropbox in Healthcare: What File Sharing Means for Patients

Cloud sharing is on everyone’s mind, even though some people still don't really understand what it is. It often helps to put a brand name to these generic services, and Dropbox is one of the most recognizable names when it comes to identifying cloud service providers. Dropbox is used at businesses around the country as a way to gain access and […]

Read More
September 1, 2016
HITECH vs. HIPAA: What You Need to Know

HIPAA and HITECH rules are often discussed together for a number of reasons, and it makes sense because one is meant to be an extension of the other. However, HIPAA was developed before the days of ubiquitous technology, meaning that it wasn't properly accounting for or regulating patient privacy when it came to keeping electronic […]

Read More
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram