Tag Archives: tokenization

How APIs Fuel Innovation

This article originally appeared on ProgrammableWeb. There has been so much talk about APIs and how they add additional revenue channels, create brand new partnerships, allow business partners to integrate with ease, and how they help with promoting your brand. … Read more >

Taming Big Data Location Transparency

Andy Thurai, Chief Architect & CTO, Intel App security & Big Data (@AndyThurai) | David Houlding, Privacy Strategist, Intel (@DavidHoulding) Original version of this article appeared on VentureBeat. Concern over big government surveillance and security vulnerabilities has reached global proportions. … Read more >

Don’t be stupid, use (cloud) protection!

- By Andy Thurai (Twitter: @AndyThurai) This article originally appeared on PandoDaily. Looks like Obama read my blog! The White House got the message. Politicians now seem to understand that while they are trying to do things to save the … Read more >

Snowden gone, ripples remain!

- By Andy Thurai (Twitter: @AndyThurai) [Original version of this blog appeared on PandoDaily magazine.] Though Snowden is long gone now, the ripple effects that he created are going to remain for a long time to come. If you haven’t … Read more >

Big Data, IoT, API …….Newer technologies protected by older security.

Now-a-days every single CIO, CTO, or business executive that I speak to is captivated by these three new technologies: Big Data, API management and IoTs (Internet of Things). Every single organizational executive that I speak with confirms that they either … Read more >

The Façade Proxy

KuppingerCole analyst Craig Burton (of Burton Group originally) wrote a recent article about Façade proxies. You can read the article here: http://blogs.kuppingercole.com/burton/2013/03/18/the-faade-proxy/ As Craig notes, “A Façade is an object that provides simple access to complex – or external – … Read more >

Intel Expressway Service Gateway and RSA DPM

Intel Expressway Service Gateway and RSA DPM: Security without pain Top security threats for 2013 include “hacktivism” attacks, botnet malware, distributed denial of service attacks, and identity theft. The problems are well known and yet there is still resistance to … Read more >

Context Aware Data Privacy (part II)

If you missed my Part 1 of this article, you can read it here when you get a chance (link). As a continuation to part 1, where I discussed the issues with Data Protection, we will explore how to solve … Read more >