Tag Archives: tokenization

How APIs Fuel Innovation

There has been so much talk about APIs and how they add additional revenue channels, create brand new partnerships, allow business partners to integrate with ease, and how they help with promoting your brand. But an important and underlooked aspect, … Read more >

Taming Big Data Location Transparency

Andy Thurai, Chief Architect & CTO, Intel App security & Big Data (@AndyThurai) | David Houlding, Privacy Strategist, Intel (@DavidHoulding) Original version of this article appeared on VentureBeat. Concern over big government surveillance and security vulnerabilities has reached global proportions. … Read more >

Don’t be stupid, use (cloud) protection!

– By Andy Thurai (Twitter: @AndyThurai) This article originally appeared on PandoDaily. Looks like Obama read my blog! The White House got the message. Politicians now seem to understand that while they are trying to do things to save the … Read more >

Snowden gone, ripples remain!

– By Andy Thurai (Twitter: @AndyThurai) [Original version of this blog appeared on PandoDaily magazine.] Though Snowden is long gone now, the ripple effects that he created are going to remain for a long time to come. If you haven’t … Read more >

Big Data, IoT, API …….Newer technologies protected by older security.

Now-a-days every single CIO, CTO, or business executive that I speak to is captivated by these three new technologies: Big Data, API management and IoTs (Internet of Things). Every single organizational executive that I speak with confirms that they either … Read more >

The Façade Proxy

“A Façade is an object that provides simple access to complex – or external – functionality. It might be used to group together several methods into a single one, to abstract a very complex method into several simple calls or, … Read more >

Intel Mashery: Security without the pain

Intel Mashery: Security without pain Top security threats for 2013 include “hacktivism” attacks, botnet malware, distributed denial of service attacks, and identity theft. The problems are well known and yet there is still resistance to spending the capital on prevention … Read more >

Context Aware Data Privacy (part II)

As a continuation to part 1, where I discussed the issues with Data Protection, we will explore how to solve some of those issues in this article. People tend to forget that hackers are attacking your systems for one reason … Read more >