6304141231
[email protected]
logo
  • Home
  • Big Data Security
    • GDPR
    • AWS
  • Data Encryption
  • Big Data Quality
    • Arya
    • Bramha
  • Customer Support
  • About
    • News
  • Download

Best Practices for Managing Data Breach Risks in AWS REDSHIFT

April 5, 2017adminKnowledgeData Breach, Dev Ops, Encryption, Outsourcing, Quality Assurance, Redshift

Managing Data Breach Risks in AWS Redshift With the accelerating adoption of AWS Redshift as the next generation cloud-based data warehouse, it is imperative that organizations deploy the appropriate level…

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X

Best Practices for Managing Data Breach Risks in DevOps

March 24, 2017adminPress ReleaseData Breach, Dev Ops, Encryption, Outsourcing, Quality Assurance

Key Takeaway DevOps routinely uses production data for testing.  With increasing use of cloud and outsourcing of testing activities, the data breach risk of sensitive data including Personally identifiable information…

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X

Best Practices for managing Data Breach Risk in MongoDB

October 31, 2016adminPress ReleaseCloud Data Security, Data Breach, Data Loss, Data Protection, Mongo DB, Mongo Security, Sensitive Data

Key Takeaway Several recent data breach incidents involved misconfigured MongoDB databases. MongoDB is a popular open source document database for big data and often used for storing sensitive data including…

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X

Pricchaa is now Part of Hortonworks community Partner Program

October 28, 2016adminPress ReleaseData Breach, Machine Learning, Sensitive Data

Chicago, IL – August 25th 2016 – Pricchaa inc.  announced that it has joined Hortonworks community Partner Program.  Pricchaa inc. offers solutions to detect and protect sensitive information, when large…

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X

Pricchaa is now Part of Cloudera Connect Partner Program

October 20, 2016adminPress ReleaseData Breach

Chicago, IL – October 19th 2016 – Pricchaa inc.  announced that it has joined Cloudera Connect Partner Program.  Pricchaa inc. offers solutions to detect and protect sensitive information on premise…

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X

SEC May Review 2011 Data Breach Disclosure Rules in light of Yahoo’s Data Breach Disclosure

October 4, 2016adminUncategorizedData Breach, Sensitive Data

SEC’s 2011 directive asked companies to disclose material information regarding cybersecurity risks and cyber incidents. In Yahoo’s data breach case, Yahoo did not disclose when it first learnt about the…

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X

HomeP

September 8, 2016adminData Breach, Machine Learning Algorithm, Sensitive Data
How are you preventing the loss of confidential and sensitive data via emails ? Google suffers data breach via benefits provider's email error ~ CSO online, May 2016 READ ARTICLE...

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X
© 2019 All rights reserved by Pricchaa Inc.
Contact